Twistlock

twistlock

When On-Premise Serverless Beats the Cloud

When most people talk about serverless architecture, what first comes to mind are cloud-based services such as Lambda. In the cloud, serverless lets you run virtually unlimited numbers of functions on-demand, using a cost-efficient payment model. However, not all serverless frameworks reside in the cloud. There are some that can be deployed on-premises, such as OpenWhisk and Fission.io. Why would you deploy serverless on-premises?

twistlock

Kubernetes AuditSync: Real-time K8s Audits and Forensics

This technical deep dive highlights key capabilities released as part of Twistlock 19.03. To learn more about what’s included with Twistlock 19.03, check out our full release blog post. Securing your environment does not stop at just the container or container runtime level. Rather, properly securing your resources requires a more holistic approach.

twistlock

How Knative Can Unite Kubernetes and Serverless

Kubernetes and serverless are two of the hottest buzzwords in tech today — and yet they’re not often part of the same conversation. Typically, Kubernetes is used to orchestrate containerized applications, while serverless computing offers a different type of deployment model. When most people think of serverless, their first thoughts still go to AWS Lambda, Azure Functions and other cloud-based serverless frameworks that brought serverless into the mainstream a few years ago.

twistlock

Runtime Application Self Protection: Protecting Your Apps Wherever They Run

This technical deep dive highlights key capabilities released as part of Twistlock 19.03. To learn more about what’s included with Twistlock 19.03, check out our full release blog post. Docker and Kubernetes are revolutionary…but they’re not the only way to run your cloud workloads. You may want to leverage the power of services like Azure Container Instances or AWS Fargate to run containers without managing servers.

twistlock

IT Security Ideas We Once Loved, But Now Should Hate

Sometimes, things that once seemed like good ideas (such as plumbing homes with lead pipes) turn out to be not so smart after all. That lesson applies to IT security, too. While many of the security best practices that you may have learned in the past still hold true, some have changed. Here’s a look at a few security strategies or practices that fall into that category.