Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Best practices for monitoring GCP audit logs

Google Cloud Platform (GCP) is a suite of cloud computing services for deploying, managing, and monitoring applications. A critical part of deploying reliable applications is securing your infrastructure. Google Cloud Audit Logs record the who, where, and when for activity within your environment, providing a breadcrumb trail that administrators can use to monitor access and detect potential threats across your resources (e.g., storage buckets, databases, service accounts, virtual machines).

Open Core vs Proprietary SaaS (which to bet your startup's life on?)

Gravitational COO, Taylor Wakefield, presents at the 2019 Open Core Summit, comparing Commercial Open Source Software ("COSS" aka, Open Core Software) to Proprietary SaaS. This presentation discusses why SaaS emerged, why COSS is now emerging and looks at the S-1 data of recently IPO'd companies in each cohort to validate the assumed benefits of each model.

Use Open Source freely without compromising on security or agility

WhiteSource provides a powerful yet simple solution for companies that need to secure and manage their open source components in their applications. As the only enterprise-grade solution that is focused exclusively on open source management, WhiteSource is trusted by the 25 of Fortune 100 companies.

Why Blockchain Needs Kubernetes

In under five years time, Kubernetes has become the default method for deploying and managing cloud applications, a remarkably fast adoption rate for any enterprise technology. Amongst other things, Kubernetes’s power lies in its ability to map compute resources to the needs of services in the current infrastructure paradigm. But how does this tool work when faced with the new infrastructure layer that is blockchain? Can the two technologies be used in conjunction?

Gravitational Teleport: Zero Trust Access that does not get in the way.

Gravitational Teleport is an open-source alternative to OpenSSH. This video is a brief overview of how Teleport provides secure access to cloud infrastructure via SSH, Kubernetes and Web Apps without getting in the way of existing developer workflows.

Sumo Logic and NIST team up to secure energy sector IoT

The energy industry used to operate on a simple hub-and-spoke model, in which large power plants would produce energy in a centralized location and distribute it out to consumers. Yet as solar, wind, and other small-scale renewable energy sources take hold in the market, that hub-and-spoke model is being replaced by a complex grid of interconnected devices.

How to Implement Network Policy in Google GKE to Secure Your Cluster

By default, pods are non-isolated; they accept traffic from any source. The Google GKE solution to this security concern is Network Security Policy that lets developers control network access to their services. Google GKE comes configured with Network Security Policy using Project Calico which can be used to secure your clusters. This class will describe a few use cases for network security policy and a live demo implementing each use case.