How to Generate and Use Dynamic Secrets for AWS IAM with Vault using Kubernetes & Helm

Part1 Vault

Your first step to securely store, access, and deploy sensitive application information
In today’s API and Cloud-platform driven world, we operators, developers, and architects are presented with the critical challenge of managing application secrets, encryption, and access to any application and infrastructure in the Cloud. Securing and rotating secrets regularly and properly, both in t…

Security and Resiliency for SaaS Companies

161019_cybersecurity

It’s neither a secret nor a surprise that security is a growing problem for SaaS companies, which cumulatively possess a tremendous amount of data. Having been proclaimed the new oil, the personal information of customers has become an extremely valuable commodity and this grabs the attention of hackers. Every day, new vulnerabilities are uncovered and malicious attacks are launched at a…

Parlons-en Cloud 2014: some topics

prlons

Next week, Stephan Bureau and I will join a few hundred IT professionals from Québec for a day-long conference on cloud computing. We’re tackling three big themes, with panelists from both vendors and end-users, spanning small and large businesses as well as governments.

The three themes are at the forefront of technology policy today:
Transition and migration
Cloud computing is a major…

420 Guy Street
Montreal, QC H3J 1S6
CANADA

56 Temperance St, 7th Floor
Toronto, ON M5H 3V5
CANADA
201 Sommerville Ave.
Sommerville, MA 02143
USA