Neeraj Nabar·23 May 2023Getting started with Kubernetes in Docker (Kind)6 mins read|Technical GuideIntroduction to Kind Primarily designed for testing Kubernetes, Kind (Kubernetes inside Docker) is a tool for running local Kubernetes clusters using lightweight Docker container “nodes ...
Ratin·19 May 2023How to SSH into Docker Container?6 mins read|Technical GuideHow to SSH into Docker Container? Docker containers can simplify the deployment of small services or monoliths. Docker, mostly, provides a lightweight and portable solution that can run on any syst
Debarshi Basak·12 Apr 2023Adaptive has completed SOC 2 Type I Audit2 mins read|GeneralIn today's rapidly evolving business landscape, enterprise-level information security has become a top priority for businesses and their customers. SOC 2 compliance is a critical benchmark for affirmi
Himanshu Garg·6 Apr 2023Privileged Identity Management (PIM) : A Brief Guide5 mins read|General What is Privileged Identity Management (PIM)? Privileged Identity Management (PIM) enables organizations to manage who (identity) can access what resources within an organization. These resour
Neeraj Nabar·16 Mar 2023What is the Principle of Least Privilege (POLP)?6 mins read|General What is the Principle of Least Privilege? We live in an age of hyperconnectivity and ubiquitous computing, which has led to the emergence of advanced cyber threats. News reports of massive data br
Akhilesh Katkar·10 Mar 2023HIPAA Compliance Checklist 2023: The 8-step Easy Guide8 mins read|Cheatsheet What is HIPAA Compliance? Health Insurance Portability and Accountability Act or more commonly known as HIPAA is a regulatory law incorporated in 1996 by the HHS, to protect and safeguard the priv
Debarshi Basak·3 Mar 20237 Alternative Use Cases for a Bastion Host9 mins read|Technical Guide What is a Bastion Host? A Bastion host allows authorized users to access a private network through an external network, such as the internet. The bastion host becomes the sole ingress path to thos
Debarshi Basak·14 Feb 2023Identity and Access Management (IAM) explained7 mins read|General Introduction to Identity and Access Management Identity and Access Management (IAM) is the branch of IT security that ensures that only authorized individuals in an organization have access to the
Ronak Massand·8 Feb 2023Understanding SOC 2: Types, Principles and Benefits7 mins read|General What is SOC 2 compliance? SOC 2 or formally Service Organization Control 2, is a security and privacy compliance standard that provides assurance to customers that a service provider has implement
Ratin·25 Jan 2023Credential Management explained: Best Practices and the Future9 mins read|General What is Credential Management? Credential management refers to the process of creating, storing, and using digital credentials, such as passwords, user names, and security certificates, to authent
Ronak Massand·15 Jan 2023Authentication Protocols: Types and Uses6 mins read|Cheatsheet What is an Authentication Protocol? Authentication is the process of determining whether a user is who they claim to be. More formally, authentication protocols define the contents of the authe
Himanshu Garg·10 Jan 2023How to set up an AWS Bastion host or a Jump server5 mins read|Technical Guide What is an AWS Bastion Host? A Bastion Host (or a jump server) is a dedicated computer used to access infrastructure resources and helps compartmentalize them. From a security perspective, a Basti