Microservice Security Design Patterns for Kubernetes (Part 1)

In this multi-part blog series, I will describe some microservice security design patterns to implement micro-segmentation and deep inspection in the interior of your Kubernetes cluster to further secure your microservice applications, not just the cluster. I will also demonstrate the design patterns with working Proof of Concept deployments that you can use as a starting point.

Bringing the Unix Philosophy to the 21st Century

Try the jc web demo! Do One Thing Well The Unix philosophy of using compact expert tools that do one thing well and pipelining them together to manipulate data is a great idea and has worked well for the past few decades. This philosophy was outlined in the 1978 Foreward to the Bell System TechnicalContinue reading “Bringing the Unix Philosophy to the 21st Century”

Hi, fellow cybersecurity and computing nerds!

I’m Kelly Brazil and I’ve been in the cybersecurity industry for a couple decades now. I taught myself how to program when I was in third grade and I love to dabble in lots of techie topics including network security, cloud computing, microservice architectures and security, software defined networking and SD-WAN, linux, APIs, guitar, andContinue reading “Hi, fellow cybersecurity and computing nerds!”

RSS
Follow by Email
LinkedIn
LinkedIn
Share