Get up to 50% off on CKA, CKAD, CKS, KCNA, KCSA exams and courses!

Security

Promo – Get 30% Off on KubeCon + CloudNativeCon Europe 2025 Tickets!

Promo – Get 30% Off on KubeCon + CloudNativeCon Europe 2025 Tickets!

Are you excited about cloud native technologies? If so, mark your calendars for KubeCon + CloudNativeCon Europe 2025 happening from April 1-4 in …

Book Review: Mastering the Red Hat Certified Engineer (RHCE) Exam

Book Review: Mastering the Red Hat Certified Engineer (RHCE) Exam

Luca Berton is a known personality in the community for his work on Ansible . He has written many best-selling books, such as Ansible for VMware by …

Implementing Immutable ConfigMaps in Kubernetes: A Practical Tutorial

Implementing Immutable ConfigMaps in Kubernetes: A Practical Tutorial

In the world of Kubernetes , ConfigMaps are a vital resource for managing configuration data in a declarative manner. ConfigMaps store key-value …

Why ChatGPT is Not Ideal for Generating Ansible Playbooks

Why ChatGPT is Not Ideal for Generating Ansible Playbooks

Ansible is a popular automation tool used in IT operations and DevOps to manage infrastructure and automate repetitive tasks. It is designed to be …

How to Use Bandit to Scan Your Python Code for Security Vulnerabilities

How to Use Bandit to Scan Your Python Code for Security Vulnerabilities

As software developers, we all want to write code that is both functional and secure. However, writing secure code can be challenging, especially if …

Secure Your Containers: Trivy Vulnerability Scanning

Secure Your Containers: Trivy Vulnerability Scanning

In today’s digital age, software applications and systems are vulnerable to a wide range of security threats. These threats can compromise sensitive …

How to Keep Your Google Cloud Account Secure

How to Keep Your Google Cloud Account Secure

Photo by Obi Onyeador With the technology boom, almost everyone around the globe has their own gadget for various purposes. Individuals use …

Conduct Vulnerability Management for Your Kubernetes Applications

Conduct Vulnerability Management for Your Kubernetes Applications

Kubernetes is an open source container orchestration tool initially developed by Google and subsequently handed over to the Cloud Native Computing …

Certificate & TLS: Becoming Custom(or Own) Root Certificate Authority

Certificate & TLS: Becoming Custom(or Own) Root Certificate Authority

Image: https://qph.fs.quoracdn.net/main-qimg-f2d9af77cbca3c6bc42bdd31437a7d6c Objective Becoming organization/private PKI provider Shared rootCA …