Deployment of Vault as a Credential Broker for Boundary

Deployment of Vault as a Credential Broker for Boundary

This article gives you feedback on implementing and using Vault as a Credential Broker for Boundary.

Run jobs on GitHub organization webhooks with Argo Workflows

Run jobs on GitHub organization webhooks with Argo Workflows

Find out how Argo Workflows can help you easily execute tasks following GitHub events triggered across all your repositories.

How to master network policies in a Kubernetes cluster?

How to master network policies in a Kubernetes cluster?

Learn how to easily restrict network traffic between your pods in a kubernetes cluster using Network Policies.

Isolate your sensitive workloads with taints, tolerations and affinities

Isolate your sensitive workloads with taints, tolerations and affinities

This article explains how to use taints, tolerations, and node affinities to isolate workloads in a Kubernetes cluster.

Using OAuth 2.0 and Terraform to secure your Azure App Service

Using OAuth 2.0 and Terraform to secure your Azure App Service

Learn how to secure a web application running on Azure App Service with Google authentication based on OAuth 2.0 without effort thanks to Terraform.

Discover Paralus, a controlled and audited access to Kubernetes

Discover Paralus, a controlled and audited access to Kubernetes

Paralus empowers companies by providing a centralized Kubernetes user authentication and authorization tool as well as audit logs.

Deploy Falco with Falcosidekick on ECS

Deploy Falco with Falcosidekick on ECS

Secure your AWS ECS cluster with Falco. This article explains how to implement Falco with falcosidekick on your ECS cluster with EC2 launch type.

How to use honey tokens effectively to detect intrusion in AWS

How to use honey tokens effectively to detect intrusion in AWS

Explore the effectiveness of Honey Tokens in AWS. Learn how to deploy and strategically position them to early detect potential attackers.

Easily plug any webapp to any IdP using oauth2-proxy

Easily plug any webapp to any IdP using oauth2-proxy

Learn how to implement an oauth2-proxy on your kubernetes cluster for secure and easy access to your apps with SSO.