A Chief Architect of cloud applications at Red Hat, Christian Posta, demonstrates why it’s important to have very fine-grained control over what traffic enters your service-mesh cluster and how to use the Istio Gateway to do this.
In this video, Scott Winkler shows you how to manage your secrets securely with Terraform.
This is an excerpt from a draft of chapter 10 of my book, Azure Data Engineering, which deals with compliance. In this article we’ll look at a few techniques to transform sensitive user data into less sensitive data. In the book, this includes code samples for implementation on Azure Data Explorer, which are omitted from this article. Let’s start with a couple of definitions.
Security expert Prabath Siriwardena shows you how to secure Microservices with Istio Service Mesh.
From Making Sense of Cyber Security by Thomas Kranz
From Operations Anti-Patterns, DevOps Solutions by Jeffery D. Smith
From Cloud Native Spring in Action by Thomas Vitale
From Azure Data Engineering by Vlad Riscutia