Cleaning Out the Server Closet: Enterprise Sustainability Through Cloud Storage and Open Ecosystems

From the world’s largest companies to smaller enterprises, sustainable practices and environmental stewardship are core to a successful business strategy. Once seen as a forward-thinking competitive advantage, sustainability has evolved into a necessity in the global economy and a key consideration for enterprises.  Since global internet usage accounts for 3.7% of all global emissions, companies […]

Policy as (Versioned) Code

This is a continuation of the PodSecurityPolicy Is Dead, Long Live…? article, which looks at how to construct the most effective policy for your Kubernetes infrastructure. Haven’t read that? Check it out first. “Policy as code” is one of the more recent “as-code” buzzwords to enter the discourse since “infrastructure-as-code” paved the way for the […]

AWS, Azure, and GCP: The Ultimate IAM Comparison

IAM (Identity and Access Management) is one of the most important yet complicated layers of cloud security. To add insult to injury, each major cloud provider (AWS, Azure, GCP) handles IAM differently, requiring cloud security professionals to learn different capabilities, restrictions, and terminology when managing IAM in a given environment. With infrastructure cloudification growing in […]

Kubernetes Requests and Limits Demystified

Note: This is the second of a five-part series covering Kubernetes resource management and optimization. In this article, we explain Kubernetes requests and limits. You can check out part one explaining Kubernetes resource types. Kubernetes provides a shared pool of resources that it allocates based on how we configure our containerized applications. The allocation process occurs when a […]

Deploy ECR-Based AWS Lambda

AWS Lambda is one of the most popular FaaS (function as a service) platforms out there. Its serverless capabilities and low cost per execution make it a go-to service for developers globally. Lambda supports multiple framework applications and multiple deployment models, and it helps developers customize their networking, permissions, and concurrency configurations. When we talk […]