Radius Method is proud to announce the release of our latest innovation, the Open Source Software Contributions (OSSC) WordPress plugin. This free tool is designed to showcase an organization’s commitment to the open-source community by displaying its contributions directly on its website. In today’s digital landscape, transparency and community engagement are more important than ever,...
As organizations increasingly rely on edge computing to process data closer to where it’s generated, ensuring high availability and reliability becomes crucial for mission-critical applications. In this article, we’ll explore how Radius Method leverages cutting-edge technologies like Zarf, Big Bang, and Iron Bank to deploy edge-ready, highly available Kubernetes clusters. Radius Method built a new...
Radius Method is announcing a new open-source Zarf Init Package specifically designed for using Iron Bank images to deploy a cluster with Big Bang. By integrating with Iron Bank’s trusted and certified images, organizations can rest assured that their software deployments are built on a foundation of utmost security. This further refines the security posture...
Independent Verification and Validation (IV&V) has long been a critical component of ensuring software quality and compliance. In today’s fast-paced digital landscape, the traditional Waterfall approach may no longer suffice. In the ever-evolving software industry, quick and continuous feedback is vital. Waterfall methodologies, characterized by lengthy phases, often struggle to provide timely insights into potential...
In an era where cybersecurity threats loom large, the concept of “Edge First Development” has emerged as a paramount strategy for safeguarding critical infrastructure and data. This approach prioritizes security by minimizing network connections to external repositories and services, thereby reducing vulnerabilities. In this article, we will explore the concept of Edge First Development in...
In today’s cybersecurity landscape, where threats evolve relentlessly, organizations cannot rely solely on tracking known vulnerabilities and Common Vulnerabilities and Exposures (CVEs) to safeguard their digital assets. While CVE tracking is essential, it’s just the tip of the iceberg. This article delves into why depending solely on CVEs is insufficient for defending against attacks and...
POC: https://github.com/radiusmethod/lortnoc In an age where digital interconnectedness dominates, supply chain risks have taken on a new form – one that lurks within the lines of code itself. This article delves into a compelling proof of concept known as “Lortnoc,” which has demonstrated the potential supply chain vulnerabilities stemming from code obfuscation. The intricate nature...
Source Code: https://github.com/radiusmethod/knock In the world of cybersecurity, the constant battle between attackers and defenders has led to the evolution of innovative techniques to safeguard network infrastructures. Among these, “Port Knocking” has emerged as a unique and increasingly popular method for enhancing network security. Originally conceived as an obscure concept, port knocking has experienced a...
While setting up a platform for one of our customers, our team noticed that it would be beneficial if we could update the banner background color and the banner text color for ArgoCD. ArgoCD is a tool that enables a Kubernetes cluster to pull changes directly from a Git repository using Helm, also known as...
For one of our customers, we had a requirement to use ArgoCD to serve up applications inside a Big Bang-based Kubernetes Cluster deployed with Zarf. There is a lot to unpack there. ArgoCD is a tool in the GitOps space that enables sort of an inversion of control pattern in a Kubernetes cluster (very similar...