Around 4 days ago, a security issue was found in Cloudflare's reverse proxy servers by a Google employee. This is a quick summary of what it is and what itRead More »
This Case Study features KAPA, a sports club management app. It covers the details of KAPA’s infrastructure setup, which includes the use of multi-cloud vendors (AWS, DigitalOcean and Azure)Read More »
Background For those of you who've been reading the tech news there was a linux kernel vulnerability identified last week which goes by the name of Dirty Cow. Essentially theRead More »
We're really excited to announce the availability of LetsEncrypt, a new security management feature we've integrated with Cloud 66. Let's Encrypt is a free, automated and open certificate authority serviceRead More »
You've got your Rails or Rack-based Ruby app built. It's even running in Docker off your laptop and other developers on your team have it up-and-running as well. Everything looksRead More »
Secrets, including private SSH keys, are almost always needed during a build. In majority of cases, we need to provide a private SSH key to pull our code from aRead More »
I'm really pleased to highlight one of our key security features: Cloud 66 Account Protection. In an era of phishing antics, rogue apps, malware and key logging attacks, we believedRead More »
Making infrastructure secure is difficult. Let's rephrase that; building a secure infrastructure needs time, experience and can be expensive. There are however some best practices that can help get thereRead More »
You may not have heard about this yet, but public PaaS is dead. That doesn't mean that it won't be around for some time. But public PaaS is becoming lessRead More »
Here at Cloud 66 we employ a number of mechanisms to ensure that your servers are kept up to date and secure. One of those mechanisms is Ubuntu's ubiquitous unattended-upgradesRead More »
Like this and want more? Subscribe to Email updates.
Thank you! We'll keep in touch.