Resource Library
Read blogs by Otis, run self-paced labs that teach you how to use Otterize in your browser, or read mentions of Otterize in the media.
- Kubernetes
First Person Platform E04 - Ian Evans on security as an enabler for financial institutions
The fourth episode of First Person Platform, a podcast: platform engineers and security practitioners nerd out with Ori Shoshan on access controls, Kubernetes, and platform engineering.
- Kubernetes
First Person Platform E04 - Ian Evans on security as an enabler for financial institutions
The fourth episode of First Person Platform, a podcast: platform engineers and security practitioners nerd out with Ori Shoshan on access controls, Kubernetes, and platform engineering.
- Oct 17 2024
Prometheus Can't Reach Your App? Network Policies Might Be to Blame!
- Oct 10 2024
AWS IAM Failure from Kubernetes? Missing Roles and IRSA Complexity Explained
- Oct 03 2024
Pod in CrashLoopBackOff state in Kubernetes? It may not be what you think!
- Sep 26 2024
Kubernetes egress vs ingress policies: common pitfalls and how to avoid them
- Sep 19 2024
Connection time out in Kubernetes: it's not what you think!
- Zero-trust
Sep 17 2024Automate Kubernetes Network Policies with Otterize: hands-on lab for dynamic security
Let's talk about the challenges of Kubernetes Network Policies as you scale and progress through your development lifecycle journey. Even better, experiment with how Otterize overcomes these challenges in a practical lab!
- Kubernetes
Aug 12 2024First Person Platform E03 - Jack Kleeman on PCI & Zero-trust with network policies at Monzo
The third episode of First Person Platform, a podcast: platform engineers nerd out with Ori Shoshan on access controls, Kubernetes, and platform engineering.
- IBAC
Jun 13 2024Mastering Kubernetes networking: A journey in cloud-native packet management
Master Kubernetes networking with a comprehensive packet walk, and learn how Otterize helps build adaptive Network Policies.
- Zero-trust
May 27 2024Moving beyond perimeter security: Lessons from the TunnelVision attack
The recent "TunnelVision" attacks reinforce the need for a new security paradigm. Let's explore how this type of attack can be mitigated in the future and what tools we need.