<img src="https://ws.zoominfo.com/pixel/JHVDdRXH2uangmUMQBZd" width="1" height="1" style="display: none;">
weaveworks_logo_headerstrip
magalix_logo_headerstrip

Weaveworks 2022.03 release featuring Magalix PaC | Learn more

theSacHub-logo

Tutorials, best practices, expert insights, and industry news on cloud security and compliance - all in one place.

      Sort by:
        Bhakti Pai Vaidya

        Bhakti Pai Vaidya

        Bhakti has 10+ years of experience in Cybersecurity and related areas.

        Recent Posts

        Policy as Code GitOps
        GitOps FAQs: 6 Commonly Asked Questions by Beginners

        Key questions answered about GitOps, a framework to manage infrastructure configurations for cloud-native technologies using the Git version control system

        Read Time 5 mins read
        Infrastructure as Code: Security Risks and Solutions

        Despite its many advantages over manual approaches to infrastructure configuration, IaC also creates some security challenges. Learn more here.

        Read Time 5 mins read
        Identity-First Security: The Foundation of Zero Trust Security

        Modern organizations must adopt an identity-first Zero Trust security approach to stay ahead of threat actors.

        Read Time 4 mins read
        Zero Trust Security
        Strengthening Supply Chain Security with Zero Trust Architecture

        Here’s why a Zero Trust security approach is one of the most reliable ways to prevent supply chain attacks.

        Read Time 5 mins read
        A Brief Guide to Supply Chain Security

        This guide unpacks the risk factors that make organizations vulnerable to supply chain attacks, and discusses some detection and mitigation strategies.

        Read Time 7 mins read
        Effective Vulnerability Management Tools For Your Cloud Infrastructure

        The most effective ways to discover and fix vulnerabilities in your cloud infrastructure, and strengthen your security posture.

        Read Time 5 mins read
        Cloud Identity and Access Management: Secrets Management

        Everything you wanted to know about cloud secrets management. Best practices and secure approaches included!

        Read Time 7 mins read
        What is IAM in Cloud Computing: All You Wanted to Know

        Get insights into cloud Identity and Access Management to strengthen your organization’s strong cloud-native security posture.

        Read Time 6 mins read
        The 5 Most Critically Vulnerable Areas in Your Cloud Infrastructure

        Protect your cloud infrastructure by understanding the key vulnerability areas according to the shared responsibility model.

        Read Time 5 mins read
        Create A CI/CD Pipeline With Kubernetes and Jenkins

        What Does CI/CD Try To Solve? CI/CD is a term that is often heard alongside other terms like DevOps, Agile,

        Min Read 018 mins read
        Deploying Kubernetes With Kafka: Best Practices

        Kafka Kafka is an open-source event streaming platform first developed by LinkedIn, then donated to the

        Min Read 08 mins read
        Monitoring Kubernetes Clusters Through Prometheus & Grafana

        Monitoring is vital whether it is web application databases or kubernetes clusters. It’s about knowing how’s

        Min Read 09 mins read
        Deploying An Application On Kubernetes From A to Z

        We’ve all been there. You learned the basics of Kubernetes, Pods, ReplicaSets, Deployments, Services, etc.

        Min Read 018 mins read
        Kubernetes side car
        The Sidecar Pattern

        Do One Thing, Do it Best The basic idea on which UNIX was designed is to not have a complex monolithic tool

        Min Read 05 mins read
        Kubernetes And Databases

        Kubernetes is a major, modern improvement in development, and databases are an essential part of the

        Min Read 08 mins read
        Kubernetes statefulsets
        Kubernetes StatefulSets 101 - State Of The Pods

        The Difference Between a Statefulset And a Deployment A Statefulset is a Kubernetes controller that is used

        Min Read 09 mins read
        How to Deploy a React App to a Kubernetes Cluster

        Kubernetes is a gold standard in the industry for deploying containerized applications in the cloud. Many

        Min Read 011 mins read
        Nodejs App From Docker To Kubernetes Cluster

        In this article, we’re developing a starter NodeJS server and deploying it to a Kubernetes cluster, starting

        Min Read 011 mins read
        Implementing A Reverse Proxy Server In Kubernetes Using The Sidecar

        What is a Sidecar? A sidecar refers to a seat attached to the bicycle or motorbike so that they run on three

        Min Read 07 mins read
        Kubernetes Observability: Log Aggregation Using ELK Stack

        Logging In The Cloud-Native Age In the old days, all components of your infrastructure were well-defined and

        Min Read 019 mins read
        Kubernetes ReplicaSets
        Kubernetes ReplicaSet 101

        What is a Kubernetes ReplicaSet? A Kubernetes pod serves as a deployment unit for the cluster. It may contain

        Min Read 09 mins read
        page
        1 2