Engineering Blog

                            
Avatar

Sirisha Badursha

Enable modern privileged access management with HashiCorp Boundary

Enable modern privileged access management with HashiCorp Boundary

September 18 12:00 PM EDT | September 19 9:00 AM BST | September 25 10:00 AM SGT Speakers : Dan Rohan Product Manager, Boundary Van Phan Technical Product Marketing Manager, Boundary and Consul Revolutionizing Secure Access with HashiCorp Boundary: Adopting a Modern, Identity-Driven Approach Traditional workflows for accessing infrastructure resources and applications often rely heavily…

The Infrastructure Cloud: Security Lifecycle Management (Europe)

The Infrastructure Cloud: Security Lifecycle Management (Europe)

Date : September 17Time : 02:30 PM GMT+5:30 | 1 hr Enhancing Cloud Security with HashiCorp’s Security Lifecycle Management In today’s fast-paced cloud environments, ensuring the security of sensitive data and infrastructure elements like secrets, certificates, keys, and customer information is a top priority for operations and security teams. However, managing security at scale in…

Deploying policy-guarded infrastructure – Creating and enforcing guardrails (Americas and Europe)

Deploying policy-guarded infrastructure – Creating and enforcing guardrails (Americas and Europe)

Date : September 17Time : 8.30 PM GMT+5.30 Streamlining Multi-Cloud Security with Policy-as-Code and Terraform As organizations expand their cloud environments to meet growing demands, rapid provisioning opens up new possibilities for innovation and growth. However, the speed of cloud infrastructure deployment can also introduce security vulnerabilities if manual checks are not enforced consistently. These…

Karpenter 1.0.0: A New Era in Kubernetes Node Lifecycle Management

Karpenter 1.0.0: A New Era in Kubernetes Node Lifecycle Management

In November 2021, AWS introduced Karpenter, an ambitious open-source project designed to transform the way Kubernetes clusters are scaled and managed. Initially, Karpenter was conceived as a high-performance, flexible alternative to the Kubernetes Cluster Autoscaler. Over the past three years, it has evolved dramatically into a comprehensive, Kubernetes-native node lifecycle manager. This evolution has not…

From Code to Container: Secure Your SDLC with Snyk – Join the Workshop!

Date : August 28Time : 3pm – 4pm (AEST) – 11am (IST) Join us for an in-depth workshop designed to enhance your application security skills by integrating Snyk with SCM systems like GitHub. This session will demonstrate how Snyk performs various security scans throughout the Software Development Life Cycle (SDLC) and offers actionable fix and…

Inside the Developer’s Day: Insights into Productivity Challenges

Inside the Developer’s Day: Insights into Productivity Challenges

Why Do Developers Lose 1 Day a Week to Inefficiencies? A recent study by Atlassian and DX highlights a significant issue in the tech industry: 69% of developers lose at least one day a week to inefficiencies that could be addressed. This problem largely stems from a disconnect between developers and their managers. Managers often…

Overcoming Common Container Security Challenges: Simplify and Secure

Overcoming Common Container Security Challenges: Simplify and Secure

Introduction to Container Security Container security encompasses practices, tools, and measures to protect the entire lifecycle of containerized applications. Containers offer portability and consistency across environments, crucial for modern software development. However, their unique structure presents distinct security challenges that need to be addressed. Why Container Security is Crucial Security breaches can occur at any…

Strengthening Your CI/CD Pipeline: Tackling Security Challenges Head-On

Strengthening Your CI/CD Pipeline: Tackling Security Challenges Head-On

CI/CD Security: A Refresher Continuous Integration and Continuous Delivery (CI/CD) have become the backbone of modern software development, enabling rapid, reliable, and consistent delivery of software products. However, with the increasing reliance on CI/CD pipelines, securing them has become non-negotiable. A compromised pipeline can lead to the deployment of vulnerable applications, causing significant damage to…

Enhanced Performance, Enhanced Efficiency: ScyllaDB’s Tablets Unleashed

Enhanced Performance, Enhanced Efficiency: ScyllaDB’s Tablets Unleashed

Date : June 27Time : 10am PT | 1pm ET | 5pm GMT Discover the Latest Architectural Innovations in ScyllaDB ScyllaDB has recently introduced a groundbreaking architectural update centered around its new “tablets” framework. This significant advancement represents the culmination of a multiyear effort to integrate and expand upon the Raft consensus protocol. Designed to…

KBOM: The Key to Enhanced Kubernetes Security and Efficiency

KBOM: The Key to Enhanced Kubernetes Security and Efficiency

Understanding the Industry Standard for Container Orchestration Insights The Kubernetes Bill of Materials (KBOM) standard is designed to offer comprehensive insights into container orchestration tools widely used across various industries. This new standard aligns with other established Bill of Materials (BOM) standards, ensuring consistency and reliability. What is KBOM? KBOM is a project aimed at…