Alcide

2016
Tel Aviv, Israel
Aug 26, 2019   |  By Amir Ofek
It is clear beyond doubt cloud-native technologies are going to transform all we know about business, software and its supporting infrastructure. So I simply could not pass on the opportunity to join old friends to take part in this exciting paradigm shift to drive end-to-end cloud security so needed to protect this next wave of innovation. Here’s how my journey brought me to Alcide.
Aug 6, 2019   |  By Theo Despoudis
Applications and workloads running on Kubernetes environment, just like any application, requires secrets to gain access to data stored in the database, 1st / 3rd party services or APIs. Secrets, however, are only effective if they actually remain secret. When secrets leak, attackers will be able to gain access to sensitive data, services or APIs and can potentially put your entire environment and business at risk.
Jul 3, 2019   |  By Twain Taylor
For most organizations that have made investments in Kubernetes, ensuring the security of their Kubernetes environment is turning out to be a significant concern. As an example of why, consider the Kubernetes privilege escalation flaw (CVE-2018-1002105) announced in December 2018. The bug allows any user who has access to the subpath volume mounts to access files outside the volume as well.
Jun 19, 2019   |  By Eric Bruno
DevOps is a practice and enterprise-wide philosophy where your delivery chain is agile and adaptable, with automated processes used everywhere possible. Part of adaptability is having the confidence that you can incorporate new types of tooling and applications without introducing undue risk or unnecessary effort. The advantage of automation and integrated security is that developers can develop without fear, allowing them to support shift-left security.
Jun 4, 2019   |  By Theo Despoudis
Everyone is talking about Kubernetes these days, and it’s no secret that Kubernetes has emerged as the leading container orchestration tool. There are a variety of reasons for that, ranging from Kubernetes’s open source, community-based development model to helpful technical features like pod security policies and automatic load balancing.
Apr 11, 2019   |  By Alcide
There are entire tool ecosystem, methodologies and endless resources to guide companies along their DevOps journey: asset Management, monitoring, and CI/CD integration to name a few. This ebook will take you through the KPIs you should either evaluate or revisit and examine what you should consider when measuring your DevOps success.
Mar 30, 2019   |  By Alcide
The benefits of the hybrid cloud and DevOps are both well known. But what happens when these two models intersect? Often DevOps and Security teams struggle to account for the added complexity introduced by hybrid configurations. But that needn't be so.
Mar 30, 2019   |  By Alcide
In order to help enterprises address cloud security issues effectively, platforms and stacks have emerged to automate, orchestrate, and simplify cloud security processes, providing greater visibility into them across the entire organisation.
Mar 1, 2019   |  By Alcide
The next generation of cloud-native technologies requires a new paradigm of security solutions that are cross-platform, unified to all cloud providers, support multiple attack vectors and have application- awareness context built-in.
Mar 1, 2019   |  By Alcide
With its soaring popularity, Kubernetes has become the de-facto orchestration tool for deploying and managing containerized applications. As with anything new, something of a Wild West atmosphere prevails while people are still learning the ins and outs, vulnerabilities, and best practices of the system.
Jul 30, 2018   |  By Amazon Web Services
Amazon Elastic Container Service for Kubernetes (Amazon EKS) makes it easy to run Kubernetes on AWS. Join AWS and our container ecosystem partners for a deep dive on Amazon EKS and explore solutions that help extend the capabilities of Kubernetes on AWS.
Jun 14, 2018   |  By Microsoft for Startups
Learn more about startup Alcide, a platform designed to bring security to the cloud.