Beware of a New GitHub Funding Phishing Scam
Explore the GitHub funding phishing scam, its attack process, and defense strategies to protect against Web3 threats in this in-depth analysis.
Beware of a New GitHub Funding Phishing Scam
Explore the GitHub funding phishing scam, its attack process, and defense strategies to protect against Web3 threats in this in-depth analysis.
Istio Configuration Security: How to Avoid Misconfigurations
Explore common Istio configuration errors and their solutions to enhance the security and stability of your service mesh.
Integrating Envoy Gateway as an Ingress Gateway in Istio Service Mesh
This article describes how to integrate Envoy Gateway as an ingress gateway in the Istio service mesh to enhance application security and accessibility.
Securing Istio: Addressing Critical Security Gaps and Best Practices
Exploring security gaps in Istio and effective mitigation strategies, combined with best practices for multi-layered security.
Envoy Gateway Overview: Modern Kubernetes Ingress with Envoy Gateway and the Gateway API
This article explores the advantages of deploying Envoy Gateway on Kubernetes, its relationship with other service mesh components, and why it’s the ideal choice for exposing services to the …
External Service Aliases: ExternalName vs ServiceEntry Comparison
ExternalName provides simple service aliases, while ServiceEntry enables complex traffic management. Choose based on your needs for external service integration.
Why Does Docker Add WebAssembly Runtime?
Explore the reasons for Docker adding WebAssembly runtime and understand its advantages in performance, security, and portability.
Certificate Revocation Support in Istio Gateways
This blog post will introduce you to certificate revocation methods and Istio’s solution.
How Are Certificates Managed in Istio?
This blog post will explain how Istio handles certificate management.
How Istio's mTLS Traffic Encryption Works as Part of a Zero Trust Security Posture
This article introduces TLS and mTLS, and describes how to enable mTLS in Istio and its application scenarios.
Please Temporarily Abandon the Illusion of Using eBPF to Replace Service Mesh and Sidecar Mode
Whether or not eBPF exists, in the foreseeable future, service mesh will be based on sidecar proxies running in user space (except for proxyless mode).