Filter & Sort
  1. ​Is Real-time Adaptive Security the Future of Data Integrity and Security

    Explore how real-time adaptive security, powered by AI and machine learning, is shaping the future of data integrity and cybersecurity.

  2. Introducing the Anaconda Community Channel: Expanding Your Open Source Arsenal While Maintaining Enterprise Control

    Introducing the Anaconda Community Channel – Unlock access to over 16,000 additional open-source packages with the new Community Channel in the Anaconda AI Platform. Designed for enterprises, it offers seamless compatibility with Anaconda’s trusted distribution, all while maintaining governance, security, and compliance. Empower developers, reduce admin overhead, and accelerate innovation—without compromising control. Now available for Business tier customers.

  3. The Shadow AI Crisis: Why Enterprise Governance Can’t Wait Any Longer

    The Shadow AI Crisis: Why Enterprise Governance Can’t Wait – With over 70% of AI use happening outside IT’s control, shadow AI is creating massive security, compliance, and visibility risks. As unofficial tools proliferate, the need for enterprise-ready governance is urgent. Learn how forward-thinking organizations are turning this underground trend into a competitive advantage with smarter platforms, embedded security, and real-time oversight.

  4. Secure and Scalable Kubernetes for Multi-Cluster Management

    Managing multi-cluster Kubernetes environments across clouds and data centers introduces complexity, security gaps, and observability challenges. This article explores how Calico Cluster Mesh provides seamless inter-cluster connectivity, fine-grained security policies, intelligent traffic management, and unified observability—empowering teams to build scalable, secure, and efficient Kubernetes architectures. Learn how companies like Box leverage Calico to enforce zero-trust security and simplify multi-cluster operations.

  5. Workload Identity Meets Supply Chain Security: Teleport's Sigstore Integration

    Modern software supply chains face increasing complexity and risk, especially from supply chain attacks like SUNBURST. This article explores how Sigstore and Teleport's Machine & Workload Identity can fortify your CI/CD pipeline. Learn how Sigstore enables keyless, verifiable artifact signing, and how Teleport integrates these signatures into workload attestation using SPIFFE-based SVIDs. Discover how to enforce policies that block compromised containers from accessing sensitive resources, and how cryptographic identity can replace static secrets for secure service-to-service communication. A must-read for DevSecOps teams aiming to embed security into the development lifecycle.

  6. Troubleshooting Kubernetes with AI: Using the K8s MCP server

    Unlock AI-powered Kubernetes troubleshooting! Discover the Model Context Protocol (MCP) and how it standardizes AI agent interactions with Kubernetes tools like kubectl, Helm, and ArgoCD. Learn how to integrate K8s MCP Server with agentic frameworks like PydanticAI for seamless, context-rich cluster management.

  7. DevOps and Platform Engineering

    DevOps brought developers and operations together to improve software delivery speed and reliability. Now, Platform Engineering builds on that foundation—enabling development teams with self-service tools, golden pathways, and smoother workflows. This article explores how Platform Engineering complements DevOps, supports scale without sacrificing autonomy, and helps high-performing teams reduce complexity while boosting productivity.

  8. Why Policy as Code is a Game Changer for Platform Engineer

    Platform engineers, revolutionize your game! Discover why Policy as Code (PaC) is the ultimate game-changer for building scalable, secure, and efficient internal developer platforms. Learn how PaC empowers developers with faster feedback, ensures secure self-service, automates governance, and fortifies your security posture effortlessly.

  9. Automatic Rollbacks are a Last Resort

    Automatic rollbacks might sound like a safe fallback for failed deployments, but modern software delivery tells a different story. This article explores why human-driven resilience, Continuous Delivery, and progressive delivery strategies are far more effective. Learn how deploying in small batches, using canary or blue/green strategies, and leveraging feature flags can help you respond smarter—and faster—when things go wrong.

  10. 10 Reasons Why Kubernetes Users Choose Kyverno Over OPA/Gatekeeper

    Tired of complex Kubernetes policy enforcement? Discover 10 compelling reasons why Kyverno, the Kubernetes-native alternative, is outperforming OPA/Gatekeeper. Learn how its simplified YAML policies, powerful mutation, and built-in generation capabilities empower DevOps for effortless security and compliance.

  11. Beyond skeleton pipelines: who owns your software pipeline?

    Are your "skeleton pipelines" secretly killing your velocity? Discover the hidden cost of an "ownership vacuum" in software delivery, wasting precious dev hours. Learn why treating pipelines as a product, not an afterthought, is crucial for improving efficiency, reducing technical debt, and making every deployment a smooth success.

  12. Guestline Saves 2,000 Hours Per Release Using Tenants in Octopus Cloud

    Guestline transformed a 20-year-old manual deployment process for its EPOS software by adopting Octopus Deploy. With Octopus Cloud and tenanted deployments, Guestline automated updates to over 800 hotel customers, saving thousands of hours and significantly improving consistency and speed. The team now delivers updates twice a month, enhancing customer experience and enabling faster cloud adoption across its global footprint.

Items 1 to 12 of 287 total

Show per page