<img src="https://ws.zoominfo.com/pixel/JHVDdRXH2uangmUMQBZd" width="1" height="1" style="display: none;">
theSacHub-logo

Tutorials, best practices, expert insights, and industry news on cloud security and compliance - all in one place.

      Sort by:

        Featured / Popular Articles

        The 5 Most Critically Vulnerable Areas in Your Cloud Infrastructure

        In the coming years, 59% of organizations plan to focus on cloud migration. By 2024, worldwide spending on cloud IT infrastructure will top $105.6 billion. Protect your cloud infrastructure by understanding the key vulnerability areas according to the shared responsibility model.

        Read time 05 mins read
        Why is Working at Magalix Different?

        Everyone who joined Magalix has a different experience and is always learning something new.

        Read time 04 mins read
        How to Start Left with Security Using Git Pre-Commit Hooks

        Understand how you can shift security left by using pre-commit hooks in Git before committing to the code base.

        Read Time 05 mins read
        Product In-Depth: Detailed Cloud Usage and Compliance Reporting

        Learn how Magalix platform can help you right-size your containers and nodes by capturing usage metrics, and resource configurations.

        Read Time 04 mins read
        A Tale of Two Woes: Security and DevOps - The SaC Podcast

        In this episode of the SaC, Mo talks to Peter Samaan, about building and maintaining a secure infrastructure, in the DevOps world.

        Read Time 4 mins read
        The Shared Security Model - Dividing Responsibilities

        Understanding the Shared Cloud Security Model and causes behind common data breaches.

        Read Time 08 mins read
        How to Prevent Non-Secure Container Images from Being Deployed with Policy-As-Code

        Security is critical to business continuity. As such, DevOps teams must prevent non-secure container images from being deployed. But how do you do it?

        Read Time 05 mins read
        Using Affinity with nodeSelector and Policy-As-Code, and Exclusions

        In a Kubernetes cluster, you have to leverage policy-as-code to enforce Node Affinity using nodeSelector. But how do you do go about it? Learn more.

        Read Time 5 mins read
        What is Security-as-Code and Why It’s Important?

        Security-as-code is about baking security practices early in the development lifecycle and preventing security violations from taking place.

        Read Time 4 mins read
        Product In-Depth: Security and Compliance Violations Detailed Reporting

        Know when a compliance violation occurs, easily identify the root cause, and begin remedying the violation with Magalix.

        Read Time 02 mins read
        Deep Dive in Policies and Where they can be Applied? - The Sac Podcast

        In this episode of the SaC, Mo and Tony discuss how codified policies can help secure the various cloud service offering and mitigate the potential risks

        Read Time 4 mins read
        Create A CI/CD Pipeline With Kubernetes And Jenkins

        What Does CI/CD Try To Solve? CI/CD is a term that is often heard alongside other terms like DevOps,

        Min Read 018 mins read
        Deploying Kubernetes With Kafka: Best Practices

        Kafka Kafka is an open-source event streaming platform first developed by LinkedIn, then donated to the

        Min Read 08 mins read
        Monitoring Kubernetes Clusters Through Prometheus & Grafana

        Monitoring is vital whether it is web application databases or kubernetes clusters. It’s about knowing

        Min Read 08 mins read
        Kubernetes StatefulSets 101 - State Of The Pods

         

        Min Read 09 mins read
        DevOps Kubernetes side car
        The Sidecar Pattern

        Do One Thing, Do it Best The basic idea on which UNIX was designed is to not have a complex monolithic

        Min Read 05 mins read
        Kubernetes And Databases

        Kubernetes is a major, modern improvement in development, and databases are an essential part of the

        Min Read 08 mins read
        Kubernetes and Containers Best Practices - Health Probes

        What Is The Health Probe Pattern? When you’re designing a mission-critical, highly-available application,

        Min Read 08 mins read
        Nodejs App From Docker To Kubernetes Cluster

        In this article, we’re developing a starter NodeJS server and deploying it to a Kubernetes cluster,

        Min Read 011 mins read
        How to Deploy a React App to a Kubernetes Cluster

        Kubernetes is a gold standard in the industry for deploying containerized applications in the cloud. Many

        Min Read 011 mins read
        Implementing A Reverse Proxy Server In Kubernetes Using The Sidecar

        What Is A Sidecar? A sidecar refers to a seat attached to the bicycle or motorbike so that they run on

        Min Read 08 mins read
        Kubernetes Observability: Log Aggregation Using ELK Stack

        Logging In The Cloud-Native Age In the old days, all components of your infrastructure were well-defined

        Min Read 019 mins read
        Deploying An Application On Kubernetes From A to Z

        We’ve all been there. You learned the basics of Kubernetes, Pods, ReplicaSets, Deployments, Services, etc.

        Min Read 019 mins read
        arrow-img” page 1 ...
        6 7 8 9 10