Blog Summary: Startup noncompliance with security frameworks like SOC 2, ISO 27001, and HIPAA leads to three primary costs: heavy
In the previous post we checked several EKS addons (Kubecost, Dynarace and Istio), but we still have others. In this
In the previous post we checked several EKS addons (Kubecost, Dynarace and Istio), but we still have others. In this
AWS introduced EKS addons in the EKS v1.20. Just a few add-ons appeared back then, e.g. VPC CNI plugin, CoreDNS,
Overview The Automat-it Secure EKS Solution is a fully automated solution for creating AWS cloud infrastructure and CI/CD process for
Problem statement Centralized network security may be challenging but absolutely required by some companies. Auditors might need evidence, that network
Problem statement Sometimes companies are so focused on product development and feature release, which may result in flaws in security,
DevOps is moving forward. Is your organization coming along for the ride? As DevOps becomes ever more widely respected and
Problem statement A modern microservices architecture allows a large application to be separated into smaller independent parts, with each part
Problem statement Sometimes companies have complicated business logic that requires a custom scheduler or autoscaler in a Kubernetes cluster. The