Simplifying kubernetes network policies with cilium
Kubernetes network policies can be difficult to write but the free cilium editor makes it really simple
Kubernetes network policies can be difficult to write but the free cilium editor makes it really simple
Kubernetes pods can be abused to take over the entire Kubernetes cluster. rbac-police shows you which.
The Cyber Essentials scheme provides simple and clear guidance but how does it apply to cicd?
Attackers typically use stolen AWS Access keys to deploy expensive cryptomining ec2 instances, but this can be be blocked with SCPs.
Simon delivered his subdomain hijacking talk with a new twist. Why is DevOps making us more vulnerable?
With so many of our talks taking us to Manchester and London, Simon jumped at the chance for a local talk in Newcastle!