Tag: cloud technology

Compliance - Security & Compliance

How GDPR Compliance and PII Protection Impact Your Business?

General Data Protection Regulation (GDPR) has emerged as a global standard for the security and compliance community. The European Commission launched GDPR in 2016 to protect the personally identifiable information (PII) of European Union (EU) citizens. As most modern companies are global, protecting personally identifiable information of customers and employees has become a business priority…

Productivity

Kubernetes Introduction: Service Mesh

For this article, we will be getting to understand what a Service Mesh is, why it is needed, and how it works in relation to Kubernetes (Orchestration framework). Definitions, terminologies will be broken down so you can better understand the aforementioned concept. Without further-ado, let’s get right into it.   Photo by Clint Adair on…

Automation - Productivity

Automating Kubernetes Deployments With ArgoCD

Overview ArgoCD is a deployment mechanism based on the GitOps principle used in Kubernetes clusters and applications running. It is an automation tool with an impact in the productivity of your development team, specially in the CI/CD process. Argo CD is a tool that helps us forget the existence of `kubectl apply`, `helm install`, and…

Automation - Infrastructure as Code - Terraform

Tools for Testing Terraform Managed Code and Infrastructure

Infrastructure as code is the backbone of any cloud-based DevOps system or architecture. In the past, it was not uncommon for testing to be downplayed as unnecessary. Engineers may look at their work and feel there is no real need to test and push to production. However, in the long run, this is a mistake….

Security & Compliance

ISO 27001 Certification: Benefits and Standards

Every company faces a variety of unique information security challenges. To answer these challenges, ISO 27001, one of the world’s most popular information security standards, was created. Formally known as ISO/IEC 27001:2005, it is an information security management system or ISMS. It provides a framework of procedures and policies which include the legal, physical, and…