Operations | Monitoring | ITSM | DevOps | Cloud

Security in Go Modules and Vulnerabilities in GoCenter at GoSF Meetup in San Francisco

Deep Datta from the JFrog Community Team shares his learnings about Go 1.13 introducing important security features to Go Modules including a checksumdb. He explains how this works and provides information on other tools in GoCenter that keep modules secure include vulnerability scanning and Jfrog Xray.

Knowledge management, collaboration, and engagement in Confluence Cloud

Chapter 3 in Atlassian's "How To Get The Most Out Of Confluence Cloud" series. In just under 3 mins, this video demonstrates how to use Confluence for popular use cases like knowledge management, collaboration, and employee engagement. Learn how to use tables, anchored headings, comments, and blogs.

Kubernetes Master Class: Find Security Vulnerabilities in your Kubernetes Cluster

Security is one of the most talked-about topics for Kubernetes users. Google “Kubernetes security” and you'll find a huge number of articles, blogs and more. The reason is simple: you need to align your container and Kubernetes security with your organization’s existing security profile.

Kubernetes Access Controls with Calico Enterprise - How to apply egress access controls

No matter where you are in your Kubernetes journey, eventually you’ll have to connect your k8s cluster to external resources like databases, cloud services, and third-party APIs. A majority of existing workloads are non-Kubernetes, and at some point, your Kubernetes applications will need to communicate with them.