Articles

Photo by Jonathan Chng on Unsplash

Photo by Jonathan Chng on Unsplash

Quick UDP Internet connections

The UDP-based Quick UDP Internet Connections (QUIC) protocol comes with mandatory TLS encryption and promises faster speeds.
Lead Image © bloomua, 123RF.com

Lead Image © bloomua, 123RF.com

Policy rulesets in cloud-native environments

What a user is allowed to do in a program is usually defined by a role model, which often poses numerous challenges, especially in the cloud or for infrastructure as code. The free Open Policy Agent offers a flexible way to manage user rights.
Lead Image © JPaget RFphotos, 123RF.com

Lead Image © JPaget RFphotos, 123RF.com

Diving into infrastructure security

How to deal with threat intelligence on the corporate network when the existing security tools are not effective.
Photo by Eric Froehling on Unsplash

Photo by Eric Froehling on Unsplash

Goodbye virtual machines, hello microVMs

You can have your cake and eat it, too: MicroVMs feature the strong isolation of virtual machines and lightweight behaviors of containers.
Photo by saeed karimi on Unsplash

Photo by saeed karimi on Unsplash

DNS name resolution with HTTPS

Now that web content is encrypted by HTTPS, the underlying name resolution is often unprotected. We look at the classic DNS protocol and investigate whether DNS over HTTPS could be the solution to ensure the confidentiality of DNS requests.
Lead Image © Andriy Popov, 123RF.com

Lead Image © Andriy Popov, 123RF.com

A central access manager for SSH, Kubernetes, and others

Teleport centrally manages logins against various protocols, including SSH, Kubernetes, and databases. Functions such as two-factor authentication are included in the scope of delivery, as is management of your own certificates.
Lead Image © rudall30, 123RF.com

Lead Image © rudall30, 123RF.com

Detect anomalies in metrics data

Anomalies in an environment's metrics data are an important indicator of an attack. The Prometheus time series database automatically detects, alerts, and forecasts anomalous behavior with the Fourier and Prophet models of the Prometheus Anomaly Detector.
Photo by Oscar Sutton on Unsplash

Photo by Oscar Sutton on Unsplash

Certificate management with FreeIPA and Dogtag

The Dogtag certificate manager integrated into the FreeIPA open source toolset generates SSL/TLS certificates for intranet services and publishes them on the network.
Photo by lee junda on Unsplash

Photo by lee junda on Unsplash

Puppet Bolt orchestration tool

Puppet Bolt free software automates administrative tasks to speed up the admin's daily work.
Photo by Shane Rounce on Unsplash

Photo by Shane Rounce on Unsplash

Statistics and machine learning with Weka

The open source Weka tool applies a wide variety of analysis methods to data without the need for advanced programming skills and without having to change environments.