security

Cisco Tech Blog

Learn about the latest tech innovations and engage in thought leadership news from Cisco.

Code Integrity Risks: The Overlooked Wrinkle in Serverless SecurityThe Ultimate Cloud Native Security FAQSecuring API Calls in Kubernetes, a simple and effective ApproachOSS API traffic visibility in K8s clustersShifting Left API Security - APIClarity Provides the Foundation for Continuous API ComplianceEverything DevOps need to know about the NSA’s Kubernetes Security GuidanceCisco announces strategic partnership with Carnegie Mellon CyLabThe 3 Pillars of API Security: Visibility, Risk Scoring & EnforcementIntroduction to SeccompMeet Cisco at KubeCon + CloudNativeCon 2021!Internal vs. External API Security: What to KnowUpstack Your Thinking - With APIClarityAPIClarity, a New Open Source Solution to Ensure API Visibility & Enhance API SecurityHardening Kubernetes Containers Security with SeccompIntroduction to Istio access controlBringing Kafka ACLs to Kubernetes the declarative wayDeploying Istio with restricted Pod Security PoliciesControlling egress traffic with IstioUsing templates for injecting dynamic configuration in VaultSecuring Vault with HSM on KubernetesRunning the Vault secret webhook alongside IstioAccessing external services with IstioManaging mutual TLS between services with IstioVault replication across multiple datacenters on KubernetesAutomatic mutual TLS in IstioInject secrets directly into Pods from Vault revisitedVault webhook - complete secret support with consul-templateKafka security on Kubernetes, automatedEnhancing Istio service mesh security with a CNI pluginBanzai Cloud PKE CIS Kubernetes benchmarkPipeline Dex integrationProvider agnostic authentication and authorization in KubernetesUnprivileged OCI image builds on KubernetesDetecting and blocking vulnerable containers in Kubernetes (deployments)Kubernetes API proxy with PipelineVulnerability scans on Kubernetes with PipelineKubernetes and external DNS servicesKubernetes secret management with PipelineVault unseal flow with KMSThe Banzai Cloud Vault OperatorThe Vault swiss-army knifePolicy enforcements on K8s with PipelineDynamic SSH with Vault and PipelineSecure Kubernetes Deployments with Vault and PipelineDynamic credentials with Vault using Kubernetes Service AccountsPlay With Ingress AuthenticationAuthentication and authorization of Pipeline users with OAuth2 and Vault