We explored the functionality, accuracy, performance and usability of function call tracing in Python using ARVOS to detect the runtime usage of known vulnerable code. We found that the approach is functional with 100% accuracy, but with an unfortunate 50% decrease in the performance of the traced application.
Operating secure Kubernetes platforms requires clear boundaries of what is in and out of scope of the team's responsibility. Learn why it's important, how to do it, and the greater context of scope setting.
Access control is about deciding and enforcing who gets to do what in a system. Learn the why, how, and what of Kubernetes access control.
What is the difference in psyche of developers and operators, what makes them great, and how can insights into this create more value?
Application dashboards over user happiness! Leverage application dashboards with Prometheus and Grafana to understand what truly matters.
In this article, we will focus on the benefits cloud native technology brings, how it brings them, and also, the greatest pitfall.
How to security harden Kubernetes in 2022. The NSA/CISA guidelines summarized, with Elastisys hands-on advice and real-world recommendations.
Vcluster allows running a logical Kubernetes cluster within a physical Kubernetes cluster, without needing cluster-admin permissions to the physical cluster. We heard people quickly making the analogy between virtual clusters…