The Otterâs Den
Your go-to hub for Kubernetes security and tech know-how
- Network
Otter this world: How to chart Kubernetes egress traffic with Otterize
Discover how Otterize helps you gain visibility into your egress Kubernetes connections.
- Network
Otter this world: How to chart Kubernetes egress traffic with Otterize
Discover how Otterize helps you gain visibility into your egress Kubernetes connections.
- Core
BlogAug 31 2023AWS releases built-in network policy enforcement for AWS EKS
Discover the latest advancement in AWS EKS as AWS unveils built-in support for enforcing Kubernetes network policies using the native VPC CNI, and simplify the implementation challenges with the open-source Otterize intents operator and network mapper.
- IBAC
BlogAug 14 2023Bite-size Otterize: moving fast and (never) breaking things
Explore the latest developments in Otterize's capabilities, tailored for users seeking precision in configuring access controls and aiming for zero trust by deploying Otterize in a "bite-size" mannerâfast, easy, predictable, and incrementally secure with each step.
- Kubernetes
BlogAug 07 2023Using Helm dashboard and intents-based access control for pain-free network segmentation
Explore an effortless method for Kubernetes network segmentation using Helm Dashboard and the intents operator, enabling a gradual transition to zero trust with step-by-step network policy implementation.
- IBAC
BlogJul 19 2023Joining Otterize and the modern network stack
In this blog post, delve into my journey of joining Otterize as the Head of Developer Relations after a background in data and IoT, exploring the exciting shift into the realm of Kubernetes and the modern network stack.
- IBAC
BlogApr 24 2023Revisiting network policy management
Explore my journey of revisiting network policy management after three and a half years, reflecting on the challenges faced at Monzo and discovering the evolution towards a solution through intent-based access control for effective service authorization rules.
- Zero-trust
BlogMar 29 2023Least-privilege for Kafka data
Discover the key challenges and solutions in securing sensitive data within Kafka, emphasizing the significance of least-privilege access control across various use cases such as event-driven architectures, messaging, queuing, and data stream aggregation.
- Core
BlogJan 31 2023Launching Otterize Cloud Beta
Introducing Otterize Cloud beta: Elevate your Otterize OSS experience with optional visibility, confidence, and operational insights for seamless access management in your cluster, offering valuable control and ease.
- IBAC
BlogDec 10 2022Generative AI, ChatGPT, and intents
Dive into the revolutionary realm of generative AI, illustrated by ChatGPT's extraordinary capabilities and its impact on intents, revealing a paradigm shift that challenges straightforward categorization.
- API
BlogAug 28 2022How I saw too much information coming back from a companyâs backend
Uncover the story of a seemingly ordinary project that evolved into an exploration of API security and backend vulnerabilities, sparked by an initial scripting task aimed at collecting product data from various web sources.