The Elastisys Tech Blog

Top Stories

All posts

Keeping key software components up to date is crucial to operate a secure Kubernetes platform. Learn what to automate and how!
Operating secure Kubernetes platforms requires ability to recover from when disaster strikes. Preparation in the form of frequent backups and training are key to success.
Learn how Elastisys helped Data4Life, a German non-profit HealthTech company, establish a process that helped them pass the BSI IT-Grundschutz audit.
Operating secure Kubernetes platforms requires an alerting culture of clear, prioritized, actionable alerts supporting administrators 24/7.
Learn how to design a two-tiered application for edge and cloud with Avassa and Elastisys Compliant Kubernetes in this white-paper.
Learn how to ensure that your application follows security best practices by enabling the OPA-enforced safeguards in Compliant Kubernetes.
We explored the functionality, accuracy, performance and usability of function call tracing in Python using ARVOS to detect the runtime usage of known vulnerable code. We found that the approach is functional with 100% accuracy, but with an unfortunate 50% decrease in the performance of the traced application.
Operating secure Kubernetes platforms requires clear boundaries of what is in and out of scope of the team's responsibility. Learn why it's important, how to do it, and the greater context of scope setting.