<img src="https://ws.zoominfo.com/pixel/JHVDdRXH2uangmUMQBZd" width="1" height="1" style="display: none;">

Magalix Introduces the Cloud-Native Application Policy Pack

Exit icon Learn More
theSacHub-logo

Tutorials, best practices, expert insights, and industry news on cloud security and compliance - all in one place.

Featured / Popular Articles

Policy-as-Code
How To Improve Your Cloud Security Posture With Policy-As-Code

Governance refers to the ability of the operations team to verify and enforce certain policies and standards across the entire organization or within specific clusters.

Read more
Policy-as-Code
The Rise of DevSecOps: Embedding Security into DevOps Workflows

We’re going to explore how we can integrate OPA with Kubernetes and see some examples of the power that this integration can bring to policy enforcement.

Read more
Policy-as-Code
Securing Your Deploy Time Environment with PaC

K8s Governance simply means the ability of operations team to verify & enforce certain policies and standards across the entire organization of clusters

Read more
    Sort by:
    What Is Zero Trust Architecture and How Does It Work?
    In an enterprise environment with containers and micro-segmentation, zero-trust architecture helps enhance security protocols. Learn more.
    Read More
    Cloud Asset Management and Protection: Storage Assets
    Learn useful strategies to manage cloud storage assets and get the most value for your investment.
    Read More
    4 Reasons Why Companies should Codify their Security
    The move to the cloud has significantly increased the operational and security complexity. Codifying security policies can help mitigate the potential risk
    Read More
    Introducing Magalix Github Actions
    Magalix now supports policy enforcement at commit time via GitHub Actions. Learn more
    Read More
    Cloud Asset Management and Protection: Compute Assets
    Managing cloud compute assets can be challenging for many IT and security teams. But it’s not impossible. Learn how to overcome these challenges here.
    Read More
    7 Notable and Costly Security Breaches
    Learn some notable security breaches that happened a few years ago, the root causes, and how Magalix can help protect your Kubernetes infrastructure
    Read More
    Security Context Settings Help Mitigate Kubernetes Risk
    Kubernetes isn't secure by default and is attacked relentlessly. But security context settings help DevOps teams better secure their pods and containers.
    Read More
    DevOps Policy as Code
    Cloud Data Asset Management and Tagging Cloud Resources
    Learn how cloud data asset management enables organizations to manage, optimize and secure their cloud data assets and resource tagging is a key part of it
    Read More
    Product In-Depth: Securing Applications in Kubernetes with Policies
    Learn how you can secure your applications in Kubernetes by using Magalix library of policies  
    Read More
    Create A CI/CD Pipeline With Kubernetes And Jenkins
    What Does CI/CD Try To Solve? CI/CD is a term that is often heard alongside other terms like DevOps,
    Read More
    Deploying Kubernetes With Kafka: Best Practices
    Kafka Kafka is an open-source event streaming platform first developed by LinkedIn, then donated to the
    Read More
    Kubernetes StatefulSets 101 - State Of The Pods
      The Difference Between a Statefulset And a Deployment
    Read More
    Monitoring Kubernetes Clusters Through Prometheus & Grafana
    Monitoring is vital whether it is web application databases or kubernetes clusters. It’s about knowing
    Read More
    The Sidecar Pattern
    Do One Thing, Do it Best
    Read More
    Kubernetes and Containers Best Practices - Health Probes
    What Is The Health Probe Pattern? When you’re designing a mission-critical, highly-available application,
    Read More
    Implementing A Reverse Proxy Server In Kubernetes Using The Sidecar
    What Is A Sidecar? A sidecar refers to a seat attached to the bicycle or motorbike so that they run on
    Read More
    Nodejs App From Docker To Kubernetes Cluster
    In this article, we’re developing a starter NodeJS server and deploying it to a Kubernetes cluster,
    Read More
    Kubernetes Observability: Log Aggregation Using ELK Stack
    Logging In The Cloud-Native Age In the old days, all components of your infrastructure were well-defined
    Read More
    Deploying An Application On Kubernetes From A to Z
    We’ve all been there. You learned the basics of Kubernetes, Pods, ReplicaSets, Deployments, Services, etc.
    Read More
    Kubernetes Patterns : Environment Variables Configuration Pattern
    Each and every application out there needs external configuration at some point. For example, the error
    Read More
    Kubernetes And Databases
    Kubernetes is a major, modern improvement in development, and databases are an essential part of the
    Read More
    page
    1 2 3 4 5

    Start Your 30-day Free Trial Today!

    Implement the proper governance and operational excellence in your Kubernetes clusters.

    “We are on a mission to add intelligence to applications and infrastructure so you can focus on what truly requires human intelligence.”