<img src="https://ws.zoominfo.com/pixel/JHVDdRXH2uangmUMQBZd" width="1" height="1" style="display: none;">
theSacHub-logo

Tutorials, best practices, expert insights, and industry news on cloud security and compliance - all in one place.

Sort by:

    Featured / Popular Articles

    What is DevSecOps and Why is it Important?

    DevSecOps stands for development, security, operations. The practice integrates security into every phase of the software development cycle. In the past, security was the last step before a software was released.

    Learn what is DevSecOps, why is it needed, and its importance to remain competitive and agile in today’s fast-paced world.

    Read time 04 mins read
    Why is Working at Magalix Different?

    Everyone who joined Magalix has a different experience and is always learning something new.

    Read time 04 mins read
    A Tale of Two Woes: Security and DevOps - The SaC Podcast

    In this episode of the SaC, Mo talks to Peter Samaan, about building and maintaining a secure infrastructure, in the DevOps world.

    Read Time 01 mins read
    The Shared Security Model - Dividing Responsibilities

    Understanding the Shared Cloud Security Model and causes behind common data breaches.

    Read Time 07 mins read
    How to Prevent Non-Secure Container Images from Being Deployed with Policy-As-Code

    Security is critical to business continuity. As such, DevOps teams must prevent non-secure container images from being deployed. But how do you do it?

    Read Time 05 mins read
    Using Affinity with nodeSelector and Policy-As-Code, and Exclusions

    In a Kubernetes cluster, you have to leverage policy-as-code to enforce Node Affinity using nodeSelector. But how do you do go about it? Learn more.

    Read Time 04 mins read
    What is Security-as-Code and Why It’s Important?

    Security-as-code is about baking security practices early in the development lifecycle and preventing security violations from taking place.

    Read Time 04 mins read
    Product In-Depth: Security and Compliance Violations Detailed Reporting

    Know when a compliance violation occurs, easily identify the root cause, and begin remedying the violation with Magalix.

    Read Time 02 mins read
    Deep Dive in Policies and Where they can be Applied? - The Sac Podcast

    In this episode of the SaC, Mo and Tony discuss how codified policies can help secure the various cloud service offering and mitigate the potential risks

    Read Time 01 mins read
    The Rise of DevSecOps in a Complex Security Landscape

    In the increasingly complex security landscape, a DevSecOps approach is becoming more popular. DevSecOps protects orgs from the outset. Here’s how.

    Read Time 05 mins read
    Security-as-Code and Why it Matters - The SaC Podcast

    Listen to this episode and learn more about what is security-as-code and why it’s imperative in the cloud era to shift security left.

    Read Time 01 mins read
    Create A CI/CD Pipeline With Kubernetes And Jenkins

    What Does CI/CD Try To Solve? CI/CD is a term that is often heard alongside other terms like DevOps,

    Min Read 02 mins read
    Deploying Kubernetes With Kafka: Best Practices

    Kafka Kafka is an open-source event streaming platform first developed by LinkedIn, then donated to the

    Min Read 08 mins read
    Kubernetes StatefulSets 101 - State Of The Pods

      The Difference Between a Statefulset And a Deployment

    Min Read 08 mins read
    Monitoring Kubernetes Clusters Through Prometheus & Grafana

    Monitoring is vital whether it is web application databases or kubernetes clusters. It’s about knowing

    Min Read 08 mins read
    The Sidecar Pattern

    Do One Thing, Do it Best

    Min Read 04 mins read
    Kubernetes and Containers Best Practices - Health Probes

    What Is The Health Probe Pattern? When you’re designing a mission-critical, highly-available application,

    Min Read 07 mins read
    Implementing A Reverse Proxy Server In Kubernetes Using The Sidecar

    What Is A Sidecar? A sidecar refers to a seat attached to the bicycle or motorbike so that they run on

    Min Read 07 mins read
    Nodejs App From Docker To Kubernetes Cluster

    In this article, we’re developing a starter NodeJS server and deploying it to a Kubernetes cluster,

    Min Read 010 mins read
    Kubernetes Observability: Log Aggregation Using ELK Stack

    Logging In The Cloud-Native Age In the old days, all components of your infrastructure were well-defined

    Min Read 019 mins read
    Kubernetes And Databases

    Kubernetes is a major, modern improvement in development, and databases are an essential part of the

    Min Read 08 mins read
    Deploying An Application On Kubernetes From A to Z

    We’ve all been there. You learned the basics of Kubernetes, Pods, ReplicaSets, Deployments, Services, etc.

    Min Read 019 mins read
    Kubernetes Patterns : Environment Variables Configuration Pattern

    Each and every application out there needs external configuration at some point. For example, the error

    Min Read 05 mins read
    arrow-img” page 1 ...
    2 3 4 5 6