Applying Orchestration and Choreography to Cybersecurity Automation

We can apply concepts from application architecture (SOA and Microservices) to more effectively build automation into our cybersecurity stacks. Orchestration and Choreography both have important roles to play.

Explaining Kubernetes to a Five Year Old

A friend of mine pointed me to a twitter thread on how to explain Kubernetes to a five year old. Since I have a two year old, this immediately popped into my head. I’ve seen the Lonely Goatherd scene from The Sound of Music many a time – my daughter absolutely loves it. And itContinue reading “Explaining Kubernetes to a Five Year Old”

Tools of the Trade for Security Systems Engineers in 2020

As we begin a new decade I thought it would be cool to see how the tools of the trade for pre-sales Systems Engineers in the network security field have changed and which tools the SE’s SE will need to be proficient with in 2020.

JC Version 1.6.1 Released

Try the jc web demo! I’m happy to announce that jc version 1.6.1 has been released and is available on github and pypi. To upgrade, run: New Parsers jc now includes 32 parsers! New parsers (tested on linux and OSX) include: du crontab files pip list pip show Updated Parsers ifconfig parser now outputs rx_bytesContinue reading “JC Version 1.6.1 Released”

Microservice Security Design Patterns for Kubernetes (Part 2)

In this post we will set the groundwork to deep dive into the Security Service Layer Pattern with a live insecure deployment on Google Kubernetes Engine (GKE). By the end of this post you will be able to bring up an insecure deployment and demonstrate layer 7 attacks and unrestricted access between internal services.

RSS
Follow by Email
LinkedIn
LinkedIn
Share