Blog SecurityKeep in touch

Which approach to evaluate the security level of my IT system?
Understand the different methods of assessing the security level of your information system (IS), and the advantages and disadvantages of each!

Your Kubernetes environments secured with Kyverno
Discover Kyverno! Theory, installation, then examples of use. Finally, the problems or limitations of the tool in a complex Kubernetes environment.

Discover Falco, a threat detection engine!
If you want to improve the security of your Kubernetes cluster managed by a cloud provider or on-premise, let's try Falco, a threat detection engine!

The financial stakes of a cyber attack: at the heart of the company's strategy
Being able to recognize and above all anticipate the risks and financial stakes of a cyber attack is key to steering the IT strategy of your company.

Security of managed Kubernetes clusters (EKS, AKS, GKE)
Most Kubernetes clusters are vulnerable. We'll take a look at the vulnerabilities present in managed clusters, and how to guard against them.

What are the big questions we have about security in the cloud?
If there is still some reluctance to move to the Cloud for security reasons, this article will answer the 5 most common questions!

Build container images in Kubernetes securely with img
The automatic docker image build in Kubernetes via CI is critical to the security of your infrastructure. Here's why and how to fix it.

DevSecOps: apply DevOps principles to increase your system security
DevSecOps is an extension of DevOps that integrates security into the software delivery process and enables faster, safer deployment of code in production.