DevOps

Improve Your Application Security Using a Reverse Proxy

Improve Your Application Security Using a Reverse Proxy

Manuel Zapf
·
Access Control
·
January, 2022

In widely deployed libraries, tracking down every use is a lot of work. Let’s explore how a reverse proxy can help you protect against attacks and why imple­menting one should be part of your security best practices.

The Key Challenges of Multi-Cluster Networking

The Key Challenges of Multi-Cluster Networking

Kate Mikula
·
Kubernetes
·
November, 2021

Today, companies rely on distributed systems to answer the growing demand for cloud-based services. But these systems are innate complex to manage.

Kubernetes Adoption Accelerates but Operational Challenges Persist

Kubernetes Adoption Accelerates but Operational Challenges Persist

Traefik Labs
·
Kubernetes
·
May, 2021

Survey of more than 1,000 professionals shows ubiquitous use of Kubernetes in production environments, while simultaneously exposing numerous management and scaling challenges

Traefik Labs uses cookies to improve your experience. By continuing to browse the site you are agreeing to our use of cookies. Find out more in the Cookie Policy.