Implementing a Password Policy in an LDAP Directory(04 Sep 2018)
A password policy is a list of rules that control how passwords within LDAP are administered. With a password policy in place, it improves security across the LDAP directory and decreases the likelihood of an account in the environment getting compromised. With rules in place, it will ensure that users will periodically update their password and also ensure that their password meets a specific criteria.
Aqua on OpenShift - Level-Up Your Container Security Game - Part I(26 Apr 2018)
As container technology becomes prevalent in organizations, teams begin to move faster, applications are deployed quicker, and there is the inevitable question that arises around security posture of the container contents. Container technology has enabled developers and operations teams to gain rapid feedback and insight into application health, and security should not be excluded from this capability. This blog article covers the first of two methods to help include application security scanning in the development pipeline so that vulnerabilities don't make it into production.
Recovering Root Access to Azure(10 Feb 2018)
So you've made a typo in your sudoers file on your linux VM in Azure and now sudo is broken and you don't have the root password. You now have a VM with no ability to get escalated privileges
Access Anywhere: Seamless and Secure Cloud Based Networking(06 Jan 2018)
If you have been in the industry for any length of time, you've used your share of Virtual Private Networks (VPN's), battled with client profile configuration, updates and of course multi-vendor client or driver interoperability issues. Connectivity needs to be seamless and available anywhere with the same user experience and predictable performance. Find out about a new offering from our friends at Meta Networks that does just this with a globally available overlay leveraging a centralized policy enforcement engine.
Are your Containers having an "Identity" Crisis? Access Management Considerations(29 Mar 2017)
With the rapid adoption of containers throughout the industry, the landscape of technology and tools in the enterprise is forever changing. Once the excitement of getting the technology up and running wears off, we are often left with the same questions we find enterprises regularly asking.
Firewalls aren't enough, Avoid Exploits with automated Patch Management(09 Nov 2016)
So let’s jump right in… what can happen when you’re environment is not security compliant and your organization is not patching your systems on a regular basis? The importance of patching regularly is a challenge many organizations face. There are times when development cycles, unportable code, lack of time and lack of discipline can prevent systems from being patched. Let’s also not forget about the whole change management challenge and testing requirements.
Cleaning the Dirty COW - Emergency Patching in Satellite 6(02 Nov 2016)
In today's short video, I'm going to demonstrate how to perform emergency patch management in Satellite 6. In specific, I will walk through patching an errata that was released by Red Hat to address a kernel vulnerability recently found called 'Dirty Cow'
A new-”ish” Satellite is in orbit(14 Jun 2016)
In mid 2014 Red Hat released the first Satellite 6 version to the market as a beta and followed up quickly with a 2015 GA release of version 6.1, which marked a milestone in the systems management arena. So what is Satellite? What makes 6.1 so different? This is the first part in a focused series of blogs targeted at breaking down the components of Red Hat Satellite to better understand the reasons why and how to transition successfully to the new and improved Satellite.
A lean, self service, new approach to web application security(14 Jun 2016)
Signal Sciences built the industry’s first SaaS-based next generation Web Application Firewall in response to frustrations trying to use legacy WAFs and a goal of accelerating business initiatives like DevOps and cloud adoption. The Signal Sciences NGWAF works seamlessly across cloud, physical and containerized infrastructure, providing actionable security prioritization based on where your applications are targeted, and blocking attacks without breaking production traffic.