• KubeSec Enterprise Summit Themes

    (12 Dec 2018)
    The sheer growth of Kubernetes interest and volume of platforms deployed worldwide enforces the fact that Enterprises are adopting Kubernetes security is top of mind. The KubeSec Enterprise Summit provided a well balanced roundup of the core security concerns, solutions, and future directions.
  • Meta Networks - Cloud-Based, Zero-Trust Networking Meetup

    (10 Dec 2018)
    Highlights from the Arctiq and Meta Networks event on November 13th 2018 on Meta's Software-Defined Perimeter and live technical demos!
  • Fireside chat with Chen Nisnkorn from Meta Networks

    (03 Dec 2018)
    I had the opportunity to have a fireside chat with Chen Nisnkorn from Meta Networks after our Secure, Cloud-Native Networking lunch event at the Arctiq office in Toronto. Chen and I became friends and both jumped into **"all things cloud"** when we worked at Ravello Systems together.
  • Improve Your Container Security with the Aqua MicroScanner for Source-to-Image Builds

    (22 Oct 2018)
    A demo of the Aqua Security Microscanner presented at Arctiq's Container Security Event.
  • Fireside Chat with Loris Degioanni and Knox Anderson from Sysdig

    (16 Oct 2018)
    We have been getting a lot of great feedback on the recent Fireside Chat series we have been posting. This week I am traveling on the west coast and had a stop over in San Francisco for GitHub Universe. I had some time on Monday so I stopped in at the Sysdig office to meet some of the extended team and dig deep into their culture and powerful technology. As we know timing is everything... I managed to get some time with Loris and Knox and have an impromptu fireside chat.
  • Fireside Chat with Liz Rice - Aqua Security

    (09 Oct 2018)
    On October 5th in Toronto @ "The Vault", Arctiq had the pleasure of hosting a fireside chat with Liz Rice from Aqua Security at our Building a Secure Container Strategy
  • Implementing a Password Policy in an LDAP Directory

    (04 Sep 2018)
    A password policy is a list of rules that control how passwords within LDAP are administered. With a password policy in place, it improves security across the LDAP directory and decreases the likelihood of an account in the environment getting compromised. With rules in place, it will ensure that users will periodically update their password and also ensure that their password meets a specific criteria.
  • Aqua on OpenShift - Level-Up Your Container Security Game - Part I

    (26 Apr 2018)
    As container technology becomes prevalent in organizations, teams begin to move faster, applications are deployed quicker, and there is the inevitable question that arises around security posture of the container contents. Container technology has enabled developers and operations teams to gain rapid feedback and insight into application health, and security should not be excluded from this capability. This blog article covers the first of two methods to help include application security scanning in the development pipeline so that vulnerabilities don't make it into production.
  • Recovering Root Access to Azure

    (10 Feb 2018)
    So you've made a typo in your sudoers file on your linux VM in Azure and now sudo is broken and you don't have the root password. You now have a VM with no ability to get escalated privileges
  • Access Anywhere: Seamless and Secure Cloud Based Networking

    (06 Jan 2018)
    If you have been in the industry for any length of time, you've used your share of Virtual Private Networks (VPN's), battled with client profile configuration, updates and of course multi-vendor client or driver interoperability issues. Connectivity needs to be seamless and available anywhere with the same user experience and predictable performance. Find out about a new offering from our friends at Meta Networks that does just this with a globally available overlay leveraging a centralized policy enforcement engine.
  • Are your Containers having an "Identity" Crisis? Access Management Considerations

    (29 Mar 2017)
    With the rapid adoption of containers throughout the industry, the landscape of technology and tools in the enterprise is forever changing. Once the excitement of getting the technology up and running wears off, we are often left with the same questions we find enterprises regularly asking.
  • Firewalls aren't enough, Avoid Exploits with automated Patch Management

    (09 Nov 2016)
    So let’s jump right in… what can happen when you’re environment is not security compliant and your organization is not patching your systems on a regular basis? The importance of patching regularly is a challenge many organizations face. There are times when development cycles, unportable code, lack of time and lack of discipline can prevent systems from being patched. Let’s also not forget about the whole change management challenge and testing requirements.
  • Cleaning the Dirty COW - Emergency Patching in Satellite 6

    (02 Nov 2016)
    In today's short video, I'm going to demonstrate how to perform emergency patch management in Satellite 6. In specific, I will walk through patching an errata that was released by Red Hat to address a kernel vulnerability recently found called 'Dirty Cow'
  • A new-”ish” Satellite is in orbit

    (14 Jun 2016)
    In mid 2014 Red Hat released the first Satellite 6 version to the market as a beta and followed up quickly with a 2015 GA release of version 6.1, which marked a milestone in the systems management arena.  So what is Satellite?  What makes 6.1 so different?  This is the first part in a focused series of blogs targeted at breaking down the components of Red Hat Satellite to better understand the reasons why and how to transition successfully to the new and improved Satellite.
  • A lean, self service, new approach to web application security

    (14 Jun 2016)
    Signal Sciences built the industry’s first SaaS-based next generation Web Application Firewall in response to frustrations trying to use legacy WAFs and a goal of accelerating business initiatives like DevOps and cloud adoption. The Signal Sciences NGWAF works seamlessly across cloud, physical and containerized infrastructure, providing actionable security prioritization based on where your applications are targeted, and blocking attacks without breaking production traffic.