Security and Encryption in Weave Net

Securing a network with full end-to-end encryption can be complicated and overlay networks add another level of difficulty. However, with Weave Net we’ve worked very hard to simplify the set-up process and make managing the whole thing as straightforward as possible.

Container Security with Dan Walsh

There are several factors to consider when securing containerized applications. Where containers are deployed, how they are isolated and which capabilities to disable are important steps to take to ensure that your dockerized applications are secure.

Cloud-Native Networking with Christopher Liljenstolpe of Tigera

Last week, Christopher Liljenstolpe of Tigera and I gave a high-level overview of Cloud-Native Networking via webinar.  It seemed well-received. We had a good set of questions at the end. If you’re interested check out the video...