security

Kubernetes and Serverless Architecture – Differences and Similarities

May 7th, 2019

Kubernetes and serverless architecture (AWS – Lambdas, Azure Functions, and Google Functions, etc.) offers powerful platforms and tremendous boosts in agility, scalability and computing performance. Serverless architectures are often referenced as Functions as a Service (FaaS). Kubernetes offers advantages that serverless alternatives do not have — and vice versa. The key to the successful deployment

Who is responsible for risk mitigation in the Cloud?

October 6th, 2010

RISK THREAT MITIGATING PARTY Insecure, Porous APIs Man in the middle, content threats, code injection, DoS attacks § Enterprise and Cloud Provider Logical Multi-Tenancy Virtual machine attacks, malicious code execution, comingled tenant data § Cloud Provider Data Protection and Confidentiality Reduced confidentiality and privacy for private data stored in the clear at the cloud provider

Building Super Secure Security

September 7th, 2010
Tags: , ,

Can a resilient and fail-safe security system be created?  Given time and money can the ultimate secure network technology be developed?  Defense Advanced Research Projects Agency (DARPA) intends to fund an initiative to find out and in June 2010 announced the Clean‐Slate Design of Resilient, Adaptive Secure Hosts (CRASH).  It relies on human biology to