The Otterâs Den
Your go-to hub for Kubernetes security and tech know-how
- IBAC
Mastering Kubernetes networking: Otterize's journey in cloud-native packet management
Master Kubernetes networking with a comprehensive packet walk, and learn how Otterize helps build adaptive Network Policies.
- IBAC
Mastering Kubernetes networking: Otterize's journey in cloud-native packet management
Master Kubernetes networking with a comprehensive packet walk, and learn how Otterize helps build adaptive Network Policies.
- Core
BlogSep 13 2023How to gradually roll out network policies with the new AWS EKS VPC
Learn how Otterize makes it easy to apply zero-trust network policies to one service while being completely certain you aren't affecting any others. Discover how you can do that in a few minutes.
- Core
BlogAug 31 2023AWS releases built-in network policy enforcement for AWS EKS
Discover the latest advancement in AWS EKS as AWS unveils built-in support for enforcing Kubernetes network policies using the native VPC CNI, and simplify the implementation challenges with the open-source Otterize intents operator and network mapper.
- Kubernetes
BlogAug 07 2023Using Helm dashboard and intents-based access control for pain-free network segmentation
Explore an effortless method for Kubernetes network segmentation using Helm Dashboard and the intents operator, enabling a gradual transition to zero trust with step-by-step network policy implementation.
- IBAC
BlogJul 19 2023Joining Otterize and the modern network stack
In this blog post, delve into my journey of joining Otterize as the Head of Developer Relations after a background in data and IoT, exploring the exciting shift into the realm of Kubernetes and the modern network stack.
- IBAC
BlogApr 24 2023Revisiting network policy management
Explore my journey of revisiting network policy management after three and a half years, reflecting on the challenges faced at Monzo and discovering the evolution towards a solution through intent-based access control for effective service authorization rules.
- Zero-trust
BlogMar 29 2023Least-privilege for Kafka data
Discover the key challenges and solutions in securing sensitive data within Kafka, emphasizing the significance of least-privilege access control across various use cases such as event-driven architectures, messaging, queuing, and data stream aggregation.
- Core
BlogJan 31 2023Launching Otterize Cloud Beta
Introducing Otterize Cloud beta: Elevate your Otterize OSS experience with optional visibility, confidence, and operational insights for seamless access management in your cluster, offering valuable control and ease.
- IBAC
BlogDec 10 2022Generative AI, ChatGPT, and intents
Dive into the revolutionary realm of generative AI, illustrated by ChatGPT's extraordinary capabilities and its impact on intents, revealing a paradigm shift that challenges straightforward categorization.
- API
BlogAug 28 2022How I saw too much information coming back from a companyâs backend
Uncover the story of a seemingly ordinary project that evolved into an exploration of API security and backend vulnerabilities, sparked by an initial scripting task aimed at collecting product data from various web sources.