Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

GitHub actions vs. Jenkins for CI/CD Pipelines

There’s an age-old saying you can tell an engineer’s age by their preferred CI/CD (continuous integration and continuous delivery) tool. Depending on who you talk to, the battle-tested Jenkins remains their weapon of choice, while GitHub Actions is the new kid on the block turning heads. However, here’s something that might surprise you – about half of all developers spend less than 20 hours per week on actual software development tasks.

Access AWS RDS Databases in EKS Using Teleport Machine ID Without Passwords

At Teleport we love modern infrastructure and open-source software, but don't like static credentials and passwords. This created a challenge for us when deploying Temporal, an open-source workflow automation software on EKS: Temporal always requires a password to authenticate to the backend RDS database. To solve this problem, we turned to Teleport Machine & Workload Identity.

Understanding Cryptographic Mechanisms

Cryptographic mechanisms protect the integrity of audit tools by ensuring that the data they collect is trustworthy. Most systems constantly run audit tools in the background, system activity such as user logins, file changes and network activity is monitored and recorded. These records are vital to system administrators for compliance, forensic analysis and security monitoring. Using cryptographic mechanisms is vital to the integrity of this data.

How to Backup and Restore OpenShift Virtualization with CloudCasa

In this insightful demo about backing up and restoring containerized virtual machines within the Red Hat OpenShift Virtualization platform. In this video, Martin provides a detailed walkthrough of the OpenShift console, shows how to register and manage your cluster with CloudCasa, and guides you through the steps of executing a backup and restoration of a VM from one OpenShift cluster (on-premise) to another OpenShift cluster hosted in the AWS infrastructure. This tutorial is essential for IT professionals and system administrators seeking to enhance their data protection strategies for containerized environments.