Uncategorized

3 Security Teams To Think About Implementing For Your Organization

In this short article, you’ll learn a few key team definitions for any organizations trying to implement a proper security practice. Blue Team When you implement a Blue Team within your organization, it’s all about defense. This is the typical team that organizations will start out with. If you see a SOC within an environment […]

3 Security Teams To Think About Implementing For Your Organization Read More »

PURPOSELY Exploiting A Kubernetes Cluster

There’s only one way to secure a Kubernetes cluster from an application stack (Deployments, Pods, ConfigMaps, Secrets, etc etc.) perspective, and that’s to see and understand an exploit. Otherwise, it’s all just theoretical, which is why it’s so important for everyone in security (including blue team) to understand how attacks work, pentesting, and vulnerabilities. In

PURPOSELY Exploiting A Kubernetes Cluster Read More »

AppSec: The Security Specialty That Rules Them All

In this blog post, you’ll learn about what AppSec (Application Security) is, what you need to break into AppSec, various AppSec tools, AppSpec terminology, and why it’s exciting. What’s AppSec? AppSec (Application Security) is the process of finding, fixing, and preventing security issues at the code or API (or both) level. The goal with AppSec

AppSec: The Security Specialty That Rules Them All Read More »

Attacking A Kubernetes Cluster (Enter Red Team Mode)

There have been several reports over the years from organizations like Red Hat and various security research firms and independent engineers that give us a few statistics. Two that are crucial to understand are: 93% of organizations suffer from a Kubernetes-related security risk. 55% of the security risks are due to misconfigurations. A misconfiguration could

Attacking A Kubernetes Cluster (Enter Red Team Mode) Read More »

A large pile of burning pallets

Impacts Of Not Setting Requests, Limits, and Quotas

Despite the innovation in the tech space from mainframes to servers to virtualization to cloud to Kubernetes, one thing holds true – resources are resources. Memory is memory. CPU is CPU. Storage is storage. These are resources that engineers still have to think and care about because, regardless of where you’re running workloads, these resources

Impacts Of Not Setting Requests, Limits, and Quotas Read More »

Glasses in front of a laptop screen

Treat Your Platform Engineering Implementation Like A Product

Open up a web browser. Google “What is Platform Engineering?”. You’ll be greeted with a massive amount of links. As you go through each Google result, you’ll notice a trend. It’s all about Developer Experience, customer service for internal engineers, and treating the Platform Engineering environment like a product. A good product encompasses amazing developer

Treat Your Platform Engineering Implementation Like A Product Read More »