Aporeto Blog

December 6, 2016
shutterstock_527570824

Dirty Cow: Story of a privilege escalation vulnerability

As the dust is settling after Dirty COW was made public on the 19th of October, it is time to reflect on why it happened and what can be done to mitigate […]
November 12, 2016

Virtualization Innovations for Securing Containers: Aporeto at the BayLISA Meetup

As Docker and other container runtimes are growing their user base, the merits and the weaknesses of Linux containers as a technology for isolation are under scrutiny. Due to the large surface […]
November 1, 2016
trireme-b

Trireme: Open Source Application Segmentation For Kubernetes

Today, Aporeto is releasing Trireme, an open source project for segmenting cloud-native applications orchestrated by Kubernetes.  We built Trireme to be simple, scalable, and secure, and to point the way to how […]
September 29, 2016
2016%2f07%2f19%2f32%2fmicroburst-c2431

Caesar’s Story: Micro-bursting Cloud Security Services

The day started like most other June days in Phoenix. For Caesar, who owned a small t-shirt printing business on the outskirts of town, getting up at 6am wasn’t hard. Heading to […]
August 10, 2016
shutterstock_316621457

Trust-Centric Security: Authentication and Authorization

I am not aware of any person who, simply by virtue of geolocation, makes trusts decisions at the office.  An office has walls and partitions to offer security and protection; yet, despite […]
July 24, 2016
home_smarthome_technology1

It’s An Official Trend: Microservices On The Rise (But Companies Still In The Rut Of Old-Fashioned Security)

The software industry has accelerated its shift towards microservices and has fully embraced distributed, cloud native apps.  Because existing application security models were designed for a different era, they are woefully inadequate, […]
July 11, 2016
shutterstock_31005118

Accelerating Business: DevOps and Microservices | Part II: Running Safer

You have been riding a bicycle for a few years and have become good at it.  You’ve learned to ride fast but, confined by technological limitations, you cannot go any faster.  Over […]
June 26, 2016
shutterstock_319654835

Accelerating Business: DevOps and Microservices | Part I: Running Faster

There is a general truth about better competitors.  This truth applies at any scale.  It applies to cultures, nations, companies, teams, and individuals.   That truth is that better competitors are faster and […]
June 7, 2016
shutterstock_131537258

Surviving the Zombie Apocalypse, AKA Software Security Principles

Take a look at our article in the Cloud Computing Journal this week providing insights into what an OS “attack surface” is and how to minimize security risks.  Think of it this way: […]
June 1, 2016
shutterstock_257918768

The Quest for Segmentation

One of the most widely deployed security practices is “segmentation”, or the process of separating end-points in different trust domains and controlling interactions between those domains through policy rules. Segmentation manages information […]
May 6, 2016
shutterstock_116553415

A Quest For Trust

It has been a common wisdom that good security depends on a solid wall.  That wisdom is reflected in impressive medieval city walls, the Chinese Wall, and even in the Game of […]
//]]>