Engineering Blog

                            
Avatar

Sirisha Badursha

New in 01Cloud: Comprehensive Cluster Scanning for a Secure Kubernetes Experience

New in 01Cloud: Comprehensive Cluster Scanning for a Secure Kubernetes Experience

With the latest update, 01Cloud introduces Cluster Scanning—a robust security feature designed to identify vulnerabilities, misconfigurations, and compliance issues in Kubernetes clusters. This feature empowers organizations to secure their Kubernetes environments by proactively detecting risks and ensuring compliance with industry standards. Cluster scanning is accessible as soon as you create a virtual cluster (vCluster) in…

Turbocharge Your IT Operations: 3 Must-Try Automations for Maximum Efficiency

Turbocharge Your IT Operations: 3 Must-Try Automations for Maximum Efficiency

If you’ve ever wished for a magic button to handle the repetitive and time-consuming aspects of IT operations, automation is your answer. From keeping an eye on system health to pushing patches, automation takes the heavy lifting off your plate. Here are three smart ways to automate your ITOps for a more efficient and smoother…

Unlocking Peak Kubernetes Performance: Overcoming Networking Challenges with Chelsio T6 SmartNIC

Unlocking Peak Kubernetes Performance: Overcoming Networking Challenges with Chelsio T6 SmartNIC

Date : Nov 7, 1:30 PM – Nov 8, 1:30 PM (GMT+5:30) As Kubernetes continues to dominate the world of container orchestration, the complexity of networking in multi-host environments becomes more apparent. While Kubernetes excels at managing containerized applications, networking performance often struggles, especially when high throughput and low latency are required. Traditional networking solutions can lead to CPU…

Enable modern privileged access management with HashiCorp Boundary

Enable modern privileged access management with HashiCorp Boundary

September 18 12:00 PM EDT | September 19 9:00 AM BST | September 25 10:00 AM SGT Speakers : Dan Rohan Product Manager, Boundary Van Phan Technical Product Marketing Manager, Boundary and Consul Revolutionizing Secure Access with HashiCorp Boundary: Adopting a Modern, Identity-Driven Approach Traditional workflows for accessing infrastructure resources and applications often rely heavily…

The Infrastructure Cloud: Security Lifecycle Management (Europe)

The Infrastructure Cloud: Security Lifecycle Management (Europe)

Date : September 17Time : 02:30 PM GMT+5:30 | 1 hr Enhancing Cloud Security with HashiCorp’s Security Lifecycle Management In today’s fast-paced cloud environments, ensuring the security of sensitive data and infrastructure elements like secrets, certificates, keys, and customer information is a top priority for operations and security teams. However, managing security at scale in…

Deploying policy-guarded infrastructure – Creating and enforcing guardrails (Americas and Europe)

Deploying policy-guarded infrastructure – Creating and enforcing guardrails (Americas and Europe)

Date : September 17Time : 8.30 PM GMT+5.30 Streamlining Multi-Cloud Security with Policy-as-Code and Terraform As organizations expand their cloud environments to meet growing demands, rapid provisioning opens up new possibilities for innovation and growth. However, the speed of cloud infrastructure deployment can also introduce security vulnerabilities if manual checks are not enforced consistently. These…

Karpenter 1.0.0: A New Era in Kubernetes Node Lifecycle Management

Karpenter 1.0.0: A New Era in Kubernetes Node Lifecycle Management

In November 2021, AWS introduced Karpenter, an ambitious open-source project designed to transform the way Kubernetes clusters are scaled and managed. Initially, Karpenter was conceived as a high-performance, flexible alternative to the Kubernetes Cluster Autoscaler. Over the past three years, it has evolved dramatically into a comprehensive, Kubernetes-native node lifecycle manager. This evolution has not…

From Code to Container: Secure Your SDLC with Snyk – Join the Workshop!

Date : August 28Time : 3pm – 4pm (AEST) – 11am (IST) Join us for an in-depth workshop designed to enhance your application security skills by integrating Snyk with SCM systems like GitHub. This session will demonstrate how Snyk performs various security scans throughout the Software Development Life Cycle (SDLC) and offers actionable fix and…

Inside the Developer’s Day: Insights into Productivity Challenges

Inside the Developer’s Day: Insights into Productivity Challenges

Why Do Developers Lose 1 Day a Week to Inefficiencies? A recent study by Atlassian and DX highlights a significant issue in the tech industry: 69% of developers lose at least one day a week to inefficiencies that could be addressed. This problem largely stems from a disconnect between developers and their managers. Managers often…

Overcoming Common Container Security Challenges: Simplify and Secure

Overcoming Common Container Security Challenges: Simplify and Secure

Introduction to Container Security Container security encompasses practices, tools, and measures to protect the entire lifecycle of containerized applications. Containers offer portability and consistency across environments, crucial for modern software development. However, their unique structure presents distinct security challenges that need to be addressed. Why Container Security is Crucial Security breaches can occur at any…