Save the date! 📅 RPT and @SUSE are teaming up for a @HashiCorp User Group (HUG) event in Indy on January 7, 2025. Don’t miss this chance to gain insights from industry expert @Bryan Krausen as we dive into secrets management, Kubernetes security, and more! #RedefinePossible
River Point Technology’s Post
More Relevant Posts
-
🔥 HashiCorp Event 🔥 Join us Nov 26th in Copenhagen to learn how to manage secrets and protect sensitive data in Kubernetes with HashiCorp Vault! 🔐✨ Eficode's Sofus Albertsen will share his real-world experiences and what he’s seen with clients 🌍🤝, and HashiCorp's Michael Gustafsson ☁ will wrap it all up by highlighting the core values and benefits 🎯💡. Join us and level up your Kubernetes security skills! 🚀👨💻👩💻 #HashiCorp #Vault #Eficode #Kubernetes
To view or add a comment, sign in
-
Have you already explored Falco for runtime security? 🔐 How has your experience been so far? Even with the best security measures in place in cloud-native environments, runtime security remains critical for protecting Kubernetes clusters. In my latest YouTube video, I provide an in-depth look at Falco and how it strengthens your security posture: 🔍 Capturing kernel events using eBPF ⚙️ Processing those events through customizable Falco rules 📊 Generating real-time logs and alerts for suspicious activities 🔧 Leveraging Falcosidekick for improved observability This video offers practical insights if you want to enhance the security of your Kubernetes workloads. Watch now via the link in the comments and share your thoughts! #kubernetes #falco #runtimesecurity
To view or add a comment, sign in
-
In my latest video on the Is It Observable YouTube channel, we’re diving deep into Falco, the go-to runtime security tool for the cloud-native world. 🎥 Having worked since several month with Kubernetes securitye, I can tell you — runtime security can be tricky. We’ve talked about securing the build and deployment phases, but detecting and responding to threats once your app is live? That’s a different ball game! That’s where #Falco comes in. I still remember the first time I experimented with #Falco. I was blown away by how it detects suspicious activity right at the kernel level using eBPF. And the fact that #Falco comes with dozens of predefined rules to detect threats like :Kubernetes API misuse, process creation in containers, and access to sensitive files — makes it incredibly powerful out of the box. Plus, Falcosidekick simplifies sending these alerts to observability platforms like Dynatrace, and others. Here’s a quick breakdown of what you’ll learn: - What suspicious activities you need to detect in a Kubernetes runtime - How Falco's rule engine works and the power of customizable rules 🛠️ - Integrating Falco with Falcosidekick to send security events to observability backends 📊 With Falco in place, you’ll feel like you’ve got an invisible security guard watching over your clusters at all times! Check out the full episode where I share my own lessons learned (and a few mistakes made 😅) in setting up this tool.
Have you already explored Falco for runtime security? 🔐 How has your experience been so far? Even with the best security measures in place in cloud-native environments, runtime security remains critical for protecting Kubernetes clusters. In my latest YouTube video, I provide an in-depth look at Falco and how it strengthens your security posture: 🔍 Capturing kernel events using eBPF ⚙️ Processing those events through customizable Falco rules 📊 Generating real-time logs and alerts for suspicious activities 🔧 Leveraging Falcosidekick for improved observability This video offers practical insights if you want to enhance the security of your Kubernetes workloads. Watch now via the link in the comments and share your thoughts! #kubernetes #falco #runtimesecurity
To view or add a comment, sign in
-
☸ We support Kubernetes admission controllers layered security. Security providing an additional layer of governance for global organizations adopting Kubernetes environments. What are Admission Controllers? Admission controllers act as gatekeepers within Kubernetes, intercepting requests before resources are persisted. Learn why it is must have: https://lnkd.in/dCvDdckS
To view or add a comment, sign in
-
SUSE NeuVector Security Rodeos are free, instructor-led, online sessions for those new to NeuVector or container security. Also great for practitioners at all levels. This hands-on workshop provides the right tools to plan for the security strategy fit for your environment. Who should attend? This workshop is designed for those in Development, Operations, Security or Management. These fun, interactive and informative sessions will help you, and your organization, determine the best security solution for your Kubernetes and other containerized workloads. All with far less burden than you would imagine!
Join SUSE's security experts on May 14 for a free virtual #NeuVector Kubernetes Security Rodeo. ✅ See firsthand how to address the challenges of #Kubernetes and power your business with a secure and compliant infrastructure. 👉 Register now here: https://okt.to/ayvJzB
SUSE NeuVector Container Security Rodeos
To view or add a comment, sign in
-
Join SUSE's security experts on May 14 for a free virtual #NeuVector Kubernetes Security Rodeo. ✅ See firsthand how to address the challenges of #Kubernetes and power your business with a secure and compliant infrastructure. 👉 Register now here: https://okt.to/LxInsO
SUSE NeuVector Container Security Rodeos
To view or add a comment, sign in
-
Discover how #RancherPrime revolutionizes your #Kubernetes management with ease! Learn about provisioning clusters and top-notch #security tools from SUSE. Check out the live demo now: https://okt.to/wbyquP
To view or add a comment, sign in
-
Kubernetes security with policy-as-code refers to automating and enforcing security policies directly within the deployment pipeline. Two notable tools in this space are Kyverno and Open Policy Agent (OPA). This article highlights the motivation behind such tools, the key differences between Kyverno and OPA and why you should consider using them as part of your Kubernetes infrastructure. https://bit.ly/4bOnwJl #devsecops #security #kubernetes
To view or add a comment, sign in
-
Join SUSE's security experts on May 14 for a free virtual #NeuVector Kubernetes Security Rodeo. ✅ See firsthand how to address the challenges of #Kubernetes and power your business with a secure and compliant infrastructure. 👉 Register now here: https://okt.to/gEIeaS
SUSE NeuVector Container Security Rodeos
To view or add a comment, sign in
-
Join SUSE's security experts on May 14 for a free virtual #NeuVector Kubernetes Security Rodeo. ✅ See firsthand how to address the challenges of #Kubernetes and power your business with a secure and compliant infrastructure. 👉 Register now here: https://okt.to/3fRWAp
SUSE NeuVector Container Security Rodeos
To view or add a comment, sign in
1,607 followers