Open in app

Sign In

Write

Sign In

Mohamed Ahmed
Mohamed Ahmed

814 Followers

Home

About

Published in Magalix

·Feb 16, 2022

Trusted Delivery: Policy as Code Integrated into GitOps Workflows

We’ve recently announced that Magalix is joining forces with Weaveworks, the GitOps company. And together, we will strive to accelerate continuous delivery and increase developer productivity so that organizations can get their software to market faster. The two companies share some common goals: To make it easy to innovate fast…

Gitops

6 min read

Trusted Delivery: Policy as Code Integrated into GitOps Workflows
Trusted Delivery: Policy as Code Integrated into GitOps Workflows
Gitops

6 min read


Published in Magalix

·Jan 26, 2022

Magalix + Weaveworks: Forging the Path of Secure GitOps Workflows

Magalix is Now Part of Weaveworks Today, we are thrilled to announce that Magalix is joining Weaveworks, the company that pioneered GitOps. The cloud-native space brought forward a wide array of benefits tightly coupled with complex infrastructure and endless opportunities. Our ultimate vision when we founded Magalix in 2017, was to help organizations innovate and navigate…

Policy As Code

4 min read

Magalix + Weaveworks: Forging the Path of Secure GitOps Workflows
Magalix + Weaveworks: Forging the Path of Secure GitOps Workflows
Policy As Code

4 min read


Published in Magalix

·Nov 24, 2021

A Brief Guide to Supply Chain Security

Overview In December 2020, the SolarWinds supply chain attack was discovered. By exploiting open vulnerabilities in the SolarWinds ® Orion ® infrastructure monitoring platform, attackers distributed malware to every organization that used the software. …

Kubernetes

5 min read

A Brief Guide to Supply Chain Security
A Brief Guide to Supply Chain Security
Kubernetes

5 min read


Published in ITNEXT

·Nov 15, 2021

Top GitOps Tactics to Build Secure Cloud-Native Infrastructure

GitOps adoption is on the rise, driven by enterprise migration to the cloud. We can attribute its growing popularity to its efficiency in streamlined infrastructure management. As such, cloud security is an essential component that goes along with it. While GitOps helps companies accelerate delivery and time to market, it…

Gitops

5 min read

Gitops

5 min read


Published in Magalix

·Oct 31, 2021

Securing Your Deploy Time Environment with PaC

You work hard to ensure the code you develop and deploy is free of issues related to compliance. The last thing you and the team need is another set of boundaries. How do more rules translate to new and more innovative problem-solving? At first glance, they won’t! …

Kubernetes

5 min read

Securing Your Deploy Time Environment with PaC
Securing Your Deploy Time Environment with PaC
Kubernetes

5 min read


Published in Magalix

·Oct 31, 2021

Shifting Left: How to Find the Right Balance Between Innovation and Risk

The pursuit of innovation and the deployment of cybersecurity measures often appear mutually exclusive. The steps we take to enhance security are concentrated on mitigating risk, while innovation demands you to be open to taking risks. Sometimes, organizations decide to prioritize innovation over security to gain a competitive advantage. Although…

Kubernetes

5 min read

Shifting Left: How to Find the Right Balance Between Innovation and Risk
Shifting Left: How to Find the Right Balance Between Innovation and Risk
Kubernetes

5 min read


Published in Magalix

·Oct 27, 2021

What Is Zero Trust Architecture and How Does It Work?

Zero-trust is a security concept that champions the idea that you don’t automatically trust anything outside or within predefined perimeters. Instead, you must verify anything that attempts to connect to enterprise systems before granting access. It’s a concept that addresses the threat of lateral movement. Within enterprise networks, you can…

Kubernetes

5 min read

What Is Zero Trust Architecture and How Does It Work?
What Is Zero Trust Architecture and How Does It Work?
Kubernetes

5 min read


Published in Magalix

·Oct 27, 2021

The Rise of DevSecOps: Embedding Security into DevOps Workflows

Overview One of the most challenging aspects of implementing a secure Cloud-Native environment is keeping up with the constant rate of change. As your teams gain familiarity and momentum with the basics, keeping track of everything going in and out of your stack becomes overwhelming and unmanageable. The Cloud-Native landscape itself…

Kubernetes

6 min read

The Rise of DevSecOps: Embedding Security into DevOps Workflows
The Rise of DevSecOps: Embedding Security into DevOps Workflows
Kubernetes

6 min read


Published in Magalix

·Oct 27, 2021

3 Simple Steps to Get Started with Security and Compliance in FinTech

Overview Cloud-Native technologies present a huge opportunity for businesses and organizations across several sectors, most notably, within the Finance and Banking fields. During the past year, the adoption of Cloud-Native technologies has rapidly increased among various sectors and geographies. According to recent studies by CNCF, there has been an increase of…

Kubernetes

6 min read

3 Simple Steps to Get Started with Security and Compliance in FinTech
3 Simple Steps to Get Started with Security and Compliance in FinTech
Kubernetes

6 min read


Published in Magalix

·Oct 27, 2021

Shift Left to Ensure Robust Kubernetes Security

At a glance, Kubernetes is a powerful solution that solves many problems. So, it’s no surprise that Kubernetes is dominating the container orchestration market. But working with it isn’t always easy as things can quickly become complicated. The same applies to Kubernetes security. Kubernetes isn’t secure by default. …

Kubernetes

8 min read

Shift Left to Ensure Robust Kubernetes Security
Shift Left to Ensure Robust Kubernetes Security
Kubernetes

8 min read

Mohamed Ahmed

Mohamed Ahmed

814 Followers

Magalix Co-Founder, dad, and learner @MohamedFAhmed

Following
  • STEPN Official

    STEPN Official

  • Lak Lakshmanan

    Lak Lakshmanan

  • Chick-fil-A Tech Blog

    Chick-fil-A Tech Blog

  • smalltown

    smalltown

  • Mohamed AbdEl Mohaimen

    Mohamed AbdEl Mohaimen

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech