Open in app

Sign In

Write

Sign In

Ismael Bouarfa

52 Followers

Home

About

Pinned

Security best practices for Containerized Applications when using Kubernetes

Kubernetes is the most popular container cluster managers on the market. Applications are containerized (for example with Docker) encapsulating files, dependencies and libraries to run on an operating system. Containerized apps require less system resources than hardware environments and traditional virtual machine because they do not include operating system images…

Kubernetes

4 min read

Security best practices for Containerized Applications when using Kubernetes
Security best practices for Containerized Applications when using Kubernetes
Kubernetes

4 min read


Apr 9

Honeypots for deception and cyberdefense

In the evolving landscape of cybersecurity, honeypots provide a deception mechanism to lure and diverting attention away from real systems. — When applied to cybersecurity, deception, is a way to deliberately offering a misleading asset to observe and anticipate malicious acts. Honeypots are designed to look like legitimate systems when they are actually isolated environments. …

Cybersecurity

4 min read

Honeypots for deception and cyberdefense
Honeypots for deception and cyberdefense
Cybersecurity

4 min read


Mar 28

The Dangers of Homoglyphs in URLs and How to Spot Them

Protecting Yourself from Phishing Attacks: How to Spot Suspicious URLs and Homoglyphs — Phishing attacks are designed to trick someone into giving personal information or money by pretending to be something or someone else. In the cyberspace it often involves fraudulent and fake websites that mimic legitimate ones. …

Cybersecurity

4 min read

The Dangers of Homoglyphs in URLs and How to Spot Them
The Dangers of Homoglyphs in URLs and How to Spot Them
Cybersecurity

4 min read


Mar 11

Beyond the Basics: Tackling threats in Active Directory Infrastructure

Active Directory: Proven Strategies and Practical Tips for Preventing threats — Active Directory is a central part of many organizations’ IT infrastructure: controlling access to applications, data, and network resources. It allows computers to find and communicate with other computers in the corporate network in an organized way. The Active Directory can also define who is authorized to access resources in…

Cybersecurity

8 min read

Beyond the Basics: Tackling threats in Active Directory Infrastructure
Beyond the Basics: Tackling threats in Active Directory Infrastructure
Cybersecurity

8 min read


Feb 19

Building a Secure Cloud Environment: Best Practices and Key Considerations

Implement essential security measures and adopt a risk-based approach to safeguard your cloud infrastructure and data — The cloud is a part of modern business operations, offering greater flexibility, scalability, and cost-effectiveness than traditional on-premise solutions. As cyber threats continue to evolve and become more sophisticated, organizations must take proactive steps to protect their assets from data breaches, theft, and other malicious activities. A risk analysis will…

Cloud

4 min read

Building a Secure Cloud Environment: Best Practices and Key Considerations
Building a Secure Cloud Environment: Best Practices and Key Considerations
Cloud

4 min read


Jan 29

Unlocking the secrets of Machine Learning Security

A comprehensive approach to enhancing Machine Learning Security : from identifying risks to implementing solutions. — Machine learning uses algorithms to learn from data in tasks such as spam detection, speech recognition, translation, chatbots… Data must be representative which will lead to better performance and accuracy. As Machine learning is an evolving field several considerations about security issues are appearing. Data curation and preprocess of the…

Machine Learning

3 min read

Unlocking the secrets of Machine Learning Security
Unlocking the secrets of Machine Learning Security
Machine Learning

3 min read


Jan 21

Applying the FCAPS Method in the New Cyber Space: Enhancing SASE Strategies

Optimizing cybersecurity operations in the Cloud Era: How leveraging FCAPS for SASE to Help Stay Ahead of the Tech Curve. FCAPS is a framework used to manage and maintain the quality of networks. FCAPS stands for Fault, Configuration, Accounting, Performance, and Security. The model consists of five functional areas: Fault…

Cybersecurity

4 min read

Applying the FCAPS Method in the New Cyber Space: Enhancing SASE Strategies
Applying the FCAPS Method in the New Cyber Space: Enhancing SASE Strategies
Cybersecurity

4 min read


Aug 28, 2022

Sécurité Cloud vs Sécurité On-premise

La gestion de la sécurité et mécanismes observés dans les environnements Cloud reflètent souvent des anciens réflexes des environnements on-premise. — Les nouveaux besoins en termes de quantités de données et haute disponibilité poussent les entreprises et développeurs à prioriser les environnements Cloud. Il existe cependant une résistance et réticence lors des migrations vers le Cloud au moment d’adopter de nouvelles pratiques relatives à la sécurité. …

Cybersécurité

3 min read

Cybersécurité

3 min read


May 23, 2022

Modern applications and Service Mesh

Why a Service Mesh is used with applications architected as distributed collections of micro services — A service mesh it’s an infrastructure layer allowing the control of how independent parts of an application communicate. It’s a layer dedicated to the business logic of an application. Is it a solution to manage communication when moving from monolithic architectures to micro services in a Kubernetes cluster where:

Cybersecurity

3 min read

Modern applications and Service Mesh
Modern applications and Service Mesh
Cybersecurity

3 min read


Published in

Towards Dev

·Dec 19, 2021

Running fast, from BIG DATA to FAST DATA.

We were seduced by the V of velocity, which is part of the 3V model of Big Data (Volume, Variety & Velocity). Can Security keep up? What was Big Data? What is Fast Data? Business models, startups, and innovation rely nowadays on data collection. The apps we use every day as tools of our daily life, collect our…

Big Data

5 min read

Running fast, from BIG DATA to FAST DATA.
Running fast, from BIG DATA to FAST DATA.
Big Data

5 min read

Ismael Bouarfa

Ismael Bouarfa

52 Followers

Cybersecurity engineer, Cloud and IA enthusiast, R&D Consultant

Following
  • David Merian

    David Merian

  • Salvatore Raieli

    Salvatore Raieli

  • Vicente Aceituno Canal

    Vicente Aceituno Canal

  • Mike Tyson of the Cloud (MToC)

    Mike Tyson of the Cloud (MToC)

  • Mitch Edwards

    Mitch Edwards

See all (52)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech