The Elastisys Tech Blog

All posts

Compliant Kubernetes logotype

How Elastisys responds to the Redis license change

The company behind Redis, Redis Labs, has changed the license of an upcoming release of Redis from open source to a "source-available" license, which prevents providers from operating a managed Redis service. This message explains how Elastisys responds and continues to keep customer data safe and secure.

Cybersecurity Trends 2024 – How Can We Face the Threats Together?

Elastisys recently brought together top cybersecurity experts in Norrland (Northern Sweden), including those in charge of critical societal services, suppliers to these services, and other industry professionals, for an insightful discussion. The meeting focused on current events, emerging trends, and evolving cybersecurity needs. What are the threats we're dealing with? What's happening right now? What do organizations need to do? And how can we respond? In this blog post, we've summarized the key takeaways from these discussions.

Cybersäkerhetstrender 2024 – hur kan vi möta hoten tillsammans?

Elastisys bjöd in ledande cybersäkerhetsexperter i Norrland – bland annat ansvariga för samhällskritiska tjänster, leverantörer till samhällskritiska tjänster och andra branschexperter. Under en eftermiddag diskuterades aktuella händelser, trender och krav som ställs kopplat till cybersäkerhet. Hur ser hotbilden ut? Vilka är de aktuella händelserna? Vilka krav ställs på oss som organisation? Och hur bör vi agera? I detta blogginlägg har vi samlat våra key takeaways från dessa diskussioner.

Secure Kubernetes Operational Practices: Cross-provider Disaster Recovery

Say your cloud provider is ransomware attacked. Switching regions won't help: those are compromised, too. Learn how Elastisys implements "cross-provider" disaster recovery for our customers, which is great for all customers, and in particular those in sectors of high criticality (NIS2).
featured blog image for "All you need to know about NIS2"

All You Need to Know About NIS2

Society increasingly relies on IT systems for basic needs, such as buying food and accessing healthcare services. These IT systems need to be networked, so…
All articles loaded
No more articles to load