-
Recruit Wizard scaled and moved to daily deployments with Octopus Cloud
Recruit Wizard transformed its software delivery by adopting Octopus Deploy for full deployment automation across Kubernetes and virtual machines. Moving from quarterly to daily deployments, the team now uses Config as Code and Runbooks to streamline releases, reduce errors, and empower non-engineering staff to run operational tasks independently. With Octopus Cloud, they’ve modernized and scaled their deployments while staying focused on growth and innovation in recruitment software.
-
The ten pillars of pragmatic deployments
Unlock the secrets to flawless software delivery! Explore the "10 Pillars of Pragmatic Deployments" that ensure repeatability, visibility, and auditability. Learn how to master rolling forward, standardize processes, and coordinate releases for robust, high-performing software pipelines.
-
Stack Overflow Uses Config as Code in Octopus for its Enterprise Solution
Stack Overflow adopted Octopus Deploy to streamline and scale its enterprise software delivery using tenanted deployments, automation, and Configuration as Code. By integrating application code, build, and deployment processes in a single GitHub repo, the team improved CI/CD efficiency, enabled better collaboration through pull requests, and reduced deployment times across multiple customers. Octopus's Azure support, API flexibility, and excellent customer service empowered Stack Overflow to standardize and mature its DevOps practices.
-
Five Reasons Standalone Vulnerability Scanning Isn’t Enough in 2025
Vulnerability scanning alone doesn’t cut it anymore. While it’s long been a core security practice, scanning tools can’t tell you which vulnerabilities are exploitable, how attackers would target them, or which ones pose real risk. This article explores the limitations of vulnerability scanning, the shortfalls of traditional vulnerability management, and why organizations must adopt a risk-based, context-driven approach to application security. Learn how to prioritize based on exploitability, integrate security across the SDLC, and move toward continuous, intelligent threat detection.
-
Security Benchmarking Authorization Policy Engines: Rego, Cedar, OpenFGA & Teleport ACD
In collaboration with Teleport, Doyensec has developed the Security Policy Evaluation Framework (SPEF) — a dynamic testing and benchmarking tool for evaluating the security, performance, and reliability of popular authorization policy engines like Rego, Cedar, OpenFGA, and Teleport ACD. Built with modular architecture and containerized execution, SPEF allows researchers and engineers to validate policies under consistent, controlled conditions. This article walks through its architecture, supported engines, and key insights from early testing across 27 threat-driven test cases.
-
Telecommunications Giant Sets the Stage for Scalable, Resilient, and Secure Software Development with JFrog
Learn how this leading multinational telecommunications company transformed its entire development platform, and achieved scalability and optimal uptime by moving to the JFrog Software Supply Chain Platform in the cloud.
-
AWS VPN: Types, Benefits, and Troubleshooting Tips
Unlock seamless, secure cloud connectivity! Explore AWS VPN types (Site-to-Site, Client VPN), their benefits, and essential setup tips. Learn how to troubleshoot common issues and discover how tools like Netmaker offer robust alternatives for building scalable, resilient networks.
-
Where Large Language Models (LLMs) meet Infrastructure Identity
As Large Language Models (LLMs) begin interfacing directly with real infrastructure, securing their access becomes critical. This article explores how the Model Context Protocol (MCP) enables LLMs to interact with databases and systems—and how Teleport’s Infrastructure Identity Platform ensures secure, auditable access. Learn how teams can enforce least-privilege policies, prevent over-permissioning, and maintain full audit trails even with AI in the loop.
-
A Guide to Cyber Attack Maps for Network Protection
Visualize the battlefield! Discover how real-time cyber attack maps offer crucial insights into global threats and targeted attacks, empowering your IT and security teams with enhanced situational awareness and streamlined communication to protect company networks.
-
How Teleport Simplifies Just-in-Time Access
Just-in-time (JIT) access is essential in cloud-native environments—but many implementations fall short. Teleport transforms JIT access into a native, secure-by-default capability by embedding it directly into identity, policy, and workflow infrastructure. From automated approvals to ephemeral credentials and unified audit logging, this article explores how Teleport enables least privilege access without the manual overhead or security gaps common in traditional JIT models.
-
LoRaWAN Explained: Protocol, Perks, and Use Cases
Unpack LoRaWAN: the low-power, long-range protocol powering the IoT revolution! Discover its unique features, star-of-stars architecture, and diverse applications from smart cities to industrial automation. Learn how it delivers cost-effectiveness, scalability, and enhanced connectivity, and how Netmaker boosts its network security.
-
Private Tunnels: Benefits and Setup for Businesses
Unmask the power of private tunnels! Discover how these secure passageways encrypt data, mask IPs, and leverage intrusion prevention for ultimate online privacy. Learn their benefits, setup essentials, and how solutions like Netmaker elevate network security for businesses.