Filter & Sort
  1. DevOps and Platform Engineering

    DevOps brought developers and operations together to improve software delivery speed and reliability. Now, Platform Engineering builds on that foundation—enabling development teams with self-service tools, golden pathways, and smoother workflows. This article explores how Platform Engineering complements DevOps, supports scale without sacrificing autonomy, and helps high-performing teams reduce complexity while boosting productivity.

  2. Why Policy as Code is a Game Changer for Platform Engineer

    Platform engineers, revolutionize your game! Discover why Policy as Code (PaC) is the ultimate game-changer for building scalable, secure, and efficient internal developer platforms. Learn how PaC empowers developers with faster feedback, ensures secure self-service, automates governance, and fortifies your security posture effortlessly.

  3. Automatic Rollbacks are a Last Resort

    Automatic rollbacks might sound like a safe fallback for failed deployments, but modern software delivery tells a different story. This article explores why human-driven resilience, Continuous Delivery, and progressive delivery strategies are far more effective. Learn how deploying in small batches, using canary or blue/green strategies, and leveraging feature flags can help you respond smarter—and faster—when things go wrong.

  4. 10 Reasons Why Kubernetes Users Choose Kyverno Over OPA/Gatekeeper

    Tired of complex Kubernetes policy enforcement? Discover 10 compelling reasons why Kyverno, the Kubernetes-native alternative, is outperforming OPA/Gatekeeper. Learn how its simplified YAML policies, powerful mutation, and built-in generation capabilities empower DevOps for effortless security and compliance.

  5. Beyond skeleton pipelines: who owns your software pipeline?

    Are your "skeleton pipelines" secretly killing your velocity? Discover the hidden cost of an "ownership vacuum" in software delivery, wasting precious dev hours. Learn why treating pipelines as a product, not an afterthought, is crucial for improving efficiency, reducing technical debt, and making every deployment a smooth success.

  6. Guestline Saves 2,000 Hours Per Release Using Tenants in Octopus Cloud

    Guestline transformed a 20-year-old manual deployment process for its EPOS software by adopting Octopus Deploy. With Octopus Cloud and tenanted deployments, Guestline automated updates to over 800 hotel customers, saving thousands of hours and significantly improving consistency and speed. The team now delivers updates twice a month, enhancing customer experience and enabling faster cloud adoption across its global footprint.

  7. Recruit Wizard scaled and moved to daily deployments with Octopus Cloud

    Recruit Wizard transformed its software delivery by adopting Octopus Deploy for full deployment automation across Kubernetes and virtual machines. Moving from quarterly to daily deployments, the team now uses Config as Code and Runbooks to streamline releases, reduce errors, and empower non-engineering staff to run operational tasks independently. With Octopus Cloud, they’ve modernized and scaled their deployments while staying focused on growth and innovation in recruitment software.

  8. Spotting Spear Phishing: A Business Cybersecurity Guide

    Don't get speared! Discover how targeted phishing attacks can devastate businesses and learn to spot subtle deceptions used by cybercriminals. This guide reveals how attackers gather info, craft convincing messages, and offers essential prevention tips, including how Netmaker boosts network protection.

  9. How to provision certificates for internal services with Teleport Workload Identity

    In today's security landscape, relying on firewalls alone is no longer enough. This article explores how Teleport Workload Identity enables secure, short-lived X.509 certificates for internal services using Mutual TLS (mTLS), eliminating long-lived secrets and enhancing workload trust. Learn how to configure and audit mTLS connections between services like NGINX and a client using SPIFFE-compliant certificates, all backed by fine-grained RBAC and detailed audit logging.

  10. Fintech Company Streamlines Software Supply Chain Management for Enhanced Security

    This leading financial services technology company has significantly improved auditability and traceability, streamlined its security technology tool stack, and strengthened its end-to-end software supply chain security by adopting JFrog Advanced Security.

  11. Security Benchmarking Authorization Policy Engines: Rego, Cedar, OpenFGA & Teleport ACD

    In collaboration with Teleport, Doyensec has developed the Security Policy Evaluation Framework (SPEF) — a dynamic testing and benchmarking tool for evaluating the security, performance, and reliability of popular authorization policy engines like Rego, Cedar, OpenFGA, and Teleport ACD. Built with modular architecture and containerized execution, SPEF allows researchers and engineers to validate policies under consistent, controlled conditions. This article walks through its architecture, supported engines, and key insights from early testing across 27 threat-driven test cases.

  12. Telecommunications Giant Sets the Stage for Scalable, Resilient, and Secure Software Development with JFrog

    Learn how this leading multinational telecommunications company transformed its entire development platform, and achieved scalability and optimal uptime by moving to the JFrog Software Supply Chain Platform in the cloud.

Items 25 to 36 of 293 total

Show per page