figures-left figure-right-top figure-right-bottom figure-center figure-left-top-mobile figures-left-bottom-mobile figures-right-top-mobile figures-right-bottom-mobile

Resources

The world of cloud changes quickly. Stay up-to-date with the latest trends & innovation, all explored in our resource library.

slider item
API Security
API Vulnerability Exposes COVID Vaccination Status of All Israeli Citizens
Dror Arie 17.08.21

Returning from my vacation abroad, I had to fill out a COVID declaration form on the Israeli Health Ministry website. Something looked weird when I filled it out on my mobile: It was too quick to indicate that I’m vaccinated, and this output came up even with a typo in my passport number. Hence I […]

Read more
slider item
Identity & Access Management (IAM)
How-To: Automated NS1 Provisioning with Okta Workflows
Dror Arie 31.05.21

While Okta and NS1 support SAML Authentication, Provisioning and de-provisioning users still requires manual work. We hate manual work, so here’s a way to automate the entire process, end-to-end, using Okta Workflows. Still unfamiliar with Workflows? Start here. Setting the Scene On NS1’s portal, Create an API Key for Okta Workflows. 2. On Okta Workflows […]

Read more
slider item
Kubernetes Cluster Management
Kubeflow: Concepts, Use Cases and Starter’s Guide
Admin Globaldots 17.03.21

In this blog, I am going to cover the basics of Kuberflow, its use cases, and installation procedure.

Read more
slider item
Kubernetes Cluster Management
How to deploy an Application in Kubernetes using Helm
Admin Globaldots 31.01.21

In this blog post, we are going to deploy a simple Dockerized Node.js application on Kubernetes using Helm.

Read more
slider item
Identity & Access Management (IAM)
How-To Guide: Okta and Akamai Integration
Dror Arie 05.01.21

Read this step-by-step guide and learn how to integrate Okta and Akamai.

Read more

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.
Contact us
figure figure figure figure figure

Don’t Fortify. Amplify | Cloud Security Reimagined