<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

Want to master Kubernetes access control? 🚀 Join our upcoming webinar!

Search
Close icon
Search bar icon
strongDM logo

blog

4+ Kubernetes Authentication Methods (Proxy, OIDC & More)

4+ Kubernetes Authentication Methods (Proxy, OIDC & More)

Kubernetes authentication presents a unique challenge. While Kubernetes defines the concepts of both user accounts and service accounts natively, it
Forward Proxy vs. Reverse Proxy: The Difference Explained

Forward Proxy vs. Reverse Proxy: The Difference Explained

In this post, we’ll dissect the two concepts and explain how administrators can use a reverse proxy for easy access management control.
Change/Reset Default MySQL Root Password (Linux & Windows)
Change/Reset Default MySQL Root Password (Linux & Windows)
On an unmodified MySQL install, the root user account does not have a password. This is extremely insecure! As a systems administrator, we know that the easiest way to compromise a system is using the default unchanged password with admin privileges.
SSH Audit Made Simple
SSH Audit Made Simple
SSH audit logs allow you to determine, either retroactively or in real-time, when an unauthorized or destructive action was taken, and by whom.
What Would My SOC 2 Dashboard Look Like?
What Would My SOC 2 Dashboard Look Like?
As your organization pursues your SOC 2 certification, organization is critical. ‍You will be busy actively managing dozens of ongoing daily tasks, which can bury you in minutiae. But at the same time, you need to keep your high-level compliance goals in focus in order to successfully move your certification over the finish line.
Everything You Need to Know About SOC 2 Audits
Everything You Need to Know About SOC 2 Audits
Whether you’re looking to achieve SOC 2 compliance, or just want to learn more about it, your Googling is bound to lead you to a wealth of articles chock full of buzzwords and acronym soup. ‍In this post, we will provide a guide with definitions, links and resources to gain a solid understanding of everything you need to know about SOC 2 audits.
How to Replace Your VPN with strongDM
How to Replace Your VPN with strongDM
So you’re ready to move away VPN or from complicated user management like LDAP, ready to stop worrying about private keys existing on developer laptops, and ready to up your compliance game with audit trails on all of your SSH and database sessions.
Software Development Life Cycle (SDLC) Policy
Software Development Life Cycle (SDLC) Policy
A software development lifecycle (SDLC) policy helps your company not suffer a similar fate by ensuring software goes through a testing process, is built as securely as possible, and that all development work is compliant as it relates to any regulatory guidelines and business needs.‍Here are some primary topics your software development lifecycle policy and software development methodology should cover
new-strongdm-desktop-app-ui
Want to learn more?
See StrongDM in action. 👀