<img src="https://ws.zoominfo.com/pixel/JHVDdRXH2uangmUMQBZd" width="1" height="1" style="display: none;">

Tutorials, best practices, expert insights, and industry news on cloud security and compliance - all in one place.

      Sort by:


        Magalix accelerates your cloud-native journey from early exploration to production optimization, governance, and tuning.

        Recent Posts

        Mitigating Apache Log4j Vulnerability with Policy-as-Code

        What is  Apache log4j vulnerability (Log4Shell)? Mitigate the risks with policy-as-code. Learn how.

        Read Time 3 mins read
        Magalix SaC Hub - Year in Review

        As the year is coming to an end, we’re taking a look back at some of the best blogs, categorized by topic, we have published at Magalix SaC Hub.

        Read Time 5 mins read
        Magalix K8s Policy Packs Cover CIS, MITRE ATT&CK, PCI DSS

        Magalix policy enforcement platform to help enterprises define, enforce and monitor policies to meet security and compliance needs on Kubernetes network…. CSI benchmark, MITRE ATT&CK, PCI DSS

        Read Time 5 mins read
        Enforcing Cloud-Native Security With CIS Benchmarks for K8s Using PaC

        Learn how to improve cloud-native security with CIS Benchmarks for K8s. See how Magalix can help you reinforce security with its new CIS Benchmarks Policy Pack.

        Read Time 6 mins read
        Securing the Cloud with Zero Trust Architecture

        In this episode of the SaC, we will discuss with Daniel Feldman, Zero Trust Architecture, the SPIFFE and SPIRE project, and what the future holds for zero-trust networks.

        Read Time 4 mins read
        Security as Code
        Top 5 Costly Data Breaches of 2021 and Its Impact

        From Astoria Company to Reindeer, this article discusses the biggest data breaches of 2021 where the companies paid a huge price and suffered major repercussions

        Read Time 4 mins read
        A CISO’s Take on How to Build a Security-First Culture

        In this episode, Mo has a candid conversation with Kevin Eberman about security in cloud-based infrastructure and applications and its challenges.

        Read Time 4 mins read
        What Is Cloud Security Posture Management (CSPM)?

        What is Cloud Security Posture Management? Why is it Important?

        Read Time 5 mins read
        NEW! MITRE ATT&CK Matrix Policies for Kubernetes

        Magalix releases MITRE ATT&CK Matrix policy pack for Kubernetes

        Read Time 3 mins read
        Create A CI/CD Pipeline With Kubernetes and Jenkins

        What Does CI/CD Try To Solve? CI/CD is a term that is often heard alongside other terms like DevOps,

        Min Read 018 mins read
        Deploying Kubernetes With Kafka: Best Practices

        Kafka Kafka is an open-source event streaming platform first developed by LinkedIn, then donated to the

        Min Read 08 mins read
        Monitoring Kubernetes Clusters Through Prometheus & Grafana

        Monitoring is vital whether it is web application databases or kubernetes clusters. It’s about knowing

        Min Read 08 mins read
        Kubernetes statefulsets
        Kubernetes StatefulSets 101 - State Of The Pods

        The Difference Between a Statefulset And a Deployment A Statefulset is a Kubernetes controller that is

        Min Read 09 mins read
        Kubernetes side car
        The Sidecar Pattern

        Do One Thing, Do it Best The basic idea on which UNIX was designed is to not have a complex monolithic

        Min Read 05 mins read
        Kubernetes And Databases

        Kubernetes is a major, modern improvement in development, and databases are an essential part of the

        Min Read 08 mins read
        Nodejs App From Docker To Kubernetes Cluster

        In this article, we’re developing a starter NodeJS server and deploying it to a Kubernetes cluster,

        Min Read 011 mins read
        How to Deploy a React App to a Kubernetes Cluster

        Kubernetes is a gold standard in the industry for deploying containerized applications in the cloud. Many

        Min Read 011 mins read
        Kubernetes and Containers Best Practices - Health Probes

        What Is The Health Probe Pattern? When you’re designing a mission-critical, highly-available application,

        Min Read 08 mins read
        Implementing A Reverse Proxy Server In Kubernetes Using The Sidecar

        What is a Sidecar? A sidecar refers to a seat attached to the bicycle or motorbike so that they run on

        Min Read 07 mins read
        Kubernetes Observability: Log Aggregation Using ELK Stack

        Logging In The Cloud-Native Age In the old days, all components of your infrastructure were well-defined

        Min Read 019 mins read
        Deploying An Application On Kubernetes From A to Z

        We’ve all been there. You learned the basics of Kubernetes, Pods, ReplicaSets, Deployments, Services, etc.

        Min Read 017 mins read
        1 2 3