Aporeto Blog

February 7, 2017

The Developer is an Investment, Not an Employee

It does not matter how you think about yourself or how good you may be at your job: Most employers see you as a cost center, aka an employee. You should be […]
December 6, 2016

Dirty Cow: Story of a privilege escalation vulnerability

As the dust is settling after Dirty COW was made public on the 19th of October, it is time to reflect on why it happened and what can be done to mitigate […]
November 12, 2016

Virtualization Innovations for Securing Containers: Aporeto at the BayLISA Meetup

As Docker and other container runtimes are growing their user base, the merits and the weaknesses of Linux containers as a technology for isolation are under scrutiny. Due to the large surface […]
November 1, 2016

Trireme: Open Source Application Segmentation For Kubernetes

Today, Aporeto is releasing Trireme, an open source project for segmenting cloud-native applications orchestrated by Kubernetes.  We built Trireme to be simple, scalable, and secure, and to point the way to how […]
September 29, 2016

Caesar’s Story: Micro-bursting Cloud Security Services

The day started like most other June days in Phoenix. For Caesar, who owned a small t-shirt printing business on the outskirts of town, getting up at 6am wasn’t hard. Heading to […]
August 10, 2016

Trust-Centric Security: Authentication and Authorization

I am not aware of any person who, simply by virtue of geolocation, makes trusts decisions at the office.  An office has walls and partitions to offer security and protection; yet, despite […]
July 24, 2016

It’s An Official Trend: Microservices On The Rise (But Companies Still In The Rut Of Old-Fashioned Security)

The software industry has accelerated its shift towards microservices and has fully embraced distributed, cloud native apps.  Because existing application security models were designed for a different era, they are woefully inadequate, […]
July 11, 2016

Accelerating Business: DevOps and Microservices | Part II: Running Safer

You have been riding a bicycle for a few years and have become good at it.  You’ve learned to ride fast but, confined by technological limitations, you cannot go any faster.  Over […]
June 26, 2016

Accelerating Business: DevOps and Microservices | Part I: Running Faster

There is a general truth about better competitors.  This truth applies at any scale.  It applies to cultures, nations, companies, teams, and individuals.   That truth is that better competitors are faster and […]
June 7, 2016

Surviving the Zombie Apocalypse, AKA Software Security Principles

Take a look at our article in the Cloud Computing Journal this week providing insights into what an OS “attack surface” is and how to minimize security risks.  Think of it this way: […]
June 1, 2016

The Quest for Segmentation

One of the most widely deployed security practices is “segmentation”, or the process of separating end-points in different trust domains and controlling interactions between those domains through policy rules. Segmentation manages information […]
May 6, 2016

A Quest For Trust

It has been a common wisdom that good security depends on a solid wall.  That wisdom is reflected in impressive medieval city walls, the Chinese Wall, and even in the Game of […]