Blog SecurityKeep in touch

Which approach to evaluate the security level of my IT system?

Which approach to evaluate the security level of my IT system?

Understand the different methods of assessing the security level of your information system (IS), and the advantages and disadvantages of each!

Your Kubernetes environments secured with Kyverno

Your Kubernetes environments secured with Kyverno

Discover Kyverno! Theory, installation, then examples of use. Finally, the problems or limitations of the tool in a complex Kubernetes environment.

Discover Falco, a threat detection engine!

Discover Falco, a threat detection engine!

If you want to improve the security of your Kubernetes cluster managed by a cloud provider or on-premise, let's try Falco, a threat detection engine!

The financial stakes of a cyber attack: at the heart of the company's strategy

The financial stakes of a cyber attack: at the heart of the company's strategy

Being able to recognize and above all anticipate the risks and financial stakes of a cyber attack is key to steering the IT strategy of your company.

Security of managed Kubernetes clusters (EKS, AKS, GKE)

Security of managed Kubernetes clusters (EKS, AKS, GKE)

Most Kubernetes clusters are vulnerable. We'll take a look at the vulnerabilities present in managed clusters, and how to guard against them.

What are the big questions we have about security in the cloud?

What are the big questions we have about security in the cloud?

If there is still some reluctance to move to the Cloud for security reasons, this article will answer the 5 most common questions!

Build container images in Kubernetes securely with img

Build container images in Kubernetes securely with img

The automatic docker image build in Kubernetes via CI is critical to the security of your infrastructure. Here's why and how to fix it.

DevSecOps: apply DevOps principles to increase your system security

DevSecOps: apply DevOps principles to increase your system security

DevSecOps is an extension of DevOps that integrates security into the software delivery process and enables faster, safer deployment of code in production.