Filter & Sort
  1. GitOps vs. DevOps: Key Differences Explained

    GitOps and DevOps are often seen as interchangeable, but they serve distinct purposes within the software delivery lifecycle. This article breaks down their differences, tools, workflows, and where they overlap. Learn how GitOps focuses on infrastructure automation using Git as the source of truth, while DevOps represents a broader cultural shift aimed at collaboration and continuous delivery. Discover how combining both approaches can streamline development, enforce consistency, and boost deployment reliability.

  2. How Ridgeline Enhanced (And Saved Money) on Their Cloud Security with CloudQuery

    Ridgeline, a cloud-native investment management platform, improved infrastructure visibility, automated compliance, and cut cloud costs by over 30% using CloudQuery. By integrating it into their CI/CD pipeline, they scaled to 300+ AWS accounts, expanded resource coverage, and reduced manual overhead—ensuring secure, efficient, and compliant cloud operations.

  3. Understand CloudBolt's Orchestration-First Approach To Remove 'Report Factory' In FinOps

    Read about CloudBolt’s take on removing ‘report factory’ in FinOps using an orchestration-first approach.

  4. Traditional Security Measures vs. Witness AI To Improve Network-Based Observability

    See how Witness AI’s network-based observability beats traditional security for enterprise AI.

  5. Edera's Approach To Container Isolation That Focuses On Security And Efficiency

    Discover how Edera is redefining container isolation with a hypervisor-based approach that blends security and efficiency without hardware virtualization. 

  6. Simplifying Traffic Routing in NordVPN’s Meshnet for Increased Security

    Route your internet traffic through your own devices with NordVPN’s Meshnet. Enjoy secure, private, and easy-to-set-up traffic control.

  7. 7 Reasons Why Businesses Need To Secure AI-Driven Applications With Mend AI

    Why securing AI applications is important for businesses and how Mend AI can help protect against emerging AI threats.

  8. SINGAPORE’S LARGEST BANK MOVES TO OPEN SOURCE WITH MARIADB

    Discover how DBS Bank, Southeast Asia's largest bank, successfully migrated mission-critical applications from Oracle to MariaDB, achieving 30-70% cost savings, enhanced flexibility with microservices, real-time data streaming, and robust compliance for its demanding financial services operations.

  9. Five Reasons Standalone Vulnerability Scanning Isn’t Enough in 2025

    Vulnerability scanning alone doesn’t cut it anymore. While it’s long been a core security practice, scanning tools can’t tell you which vulnerabilities are exploitable, how attackers would target them, or which ones pose real risk. This article explores the limitations of vulnerability scanning, the shortfalls of traditional vulnerability management, and why organizations must adopt a risk-based, context-driven approach to application security. Learn how to prioritize based on exploitability, integrate security across the SDLC, and move toward continuous, intelligent threat detection.

  10. Workload Identity Meets Supply Chain Security: Teleport's Sigstore Integration

    Modern software supply chains face increasing complexity and risk, especially from supply chain attacks like SUNBURST. This article explores how Sigstore and Teleport's Machine & Workload Identity can fortify your CI/CD pipeline. Learn how Sigstore enables keyless, verifiable artifact signing, and how Teleport integrates these signatures into workload attestation using SPIFFE-based SVIDs. Discover how to enforce policies that block compromised containers from accessing sensitive resources, and how cryptographic identity can replace static secrets for secure service-to-service communication. A must-read for DevSecOps teams aiming to embed security into the development lifecycle.

  11. Secure and Scalable Kubernetes for Multi-Cluster Management

    Managing multi-cluster Kubernetes environments across clouds and data centers introduces complexity, security gaps, and observability challenges. This article explores how Calico Cluster Mesh provides seamless inter-cluster connectivity, fine-grained security policies, intelligent traffic management, and unified observability—empowering teams to build scalable, secure, and efficient Kubernetes architectures. Learn how companies like Box leverage Calico to enforce zero-trust security and simplify multi-cluster operations.

  12. Stack Overflow Uses Config as Code in Octopus for its Enterprise Solution

    Stack Overflow adopted Octopus Deploy to streamline and scale its enterprise software delivery using tenanted deployments, automation, and Configuration as Code. By integrating application code, build, and deployment processes in a single GitHub repo, the team improved CI/CD efficiency, enabled better collaboration through pull requests, and reduced deployment times across multiple customers. Octopus's Azure support, API flexibility, and excellent customer service empowered Stack Overflow to standardize and mature its DevOps practices.

Items 1 to 12 of 202 total

Show per page