Filter & Sort
  1. A Costly Divide: 5 Ways to Stop AppSec and Dev from Working Against Each Other

    The disconnect between AppSec and development teams is more than a collaboration issue—it’s a major business risk. This article explores the root causes of this divide, from misaligned goals to disconnected toolchains, and offers practical strategies for uniting teams. Learn how to embed security into the developer workflow, prioritize risk over noise, and foster a culture of shared responsibility and continuous improvement.

  2. How Codezero Slashed Kubernetes Setup Times from Hours to Minutes with Civo

    Discover how Codezero, a development innovation leader, revolutionized its workflow and boosted developer productivity by leveraging Civo Kubernetes. Learn how they slashed cluster setup times from hours to minutes, enabling every engineer to develop against live Kubernetes, treating environments as "disposable objects" with unparalleled support.

  3. Web Application Security Testing: 6 Essential Elements for 2025

    Web application security testing is more critical than ever as enterprises face growing threats and regulatory demands. This article breaks down essential components of an effective testing program—defining scope, blending automated and manual tools, integrating into the SDLC, and prioritizing risk. Learn how modern approaches like ASPM, AI, and continuous monitoring can help security teams stay ahead of evolving vulnerabilities and protect enterprise applications.

  4. 80% Less Spend, More Innovation: Krumware's Success with Civo Kubernetes

    Discover how Krumware, a leader in platform engineering, slashed cloud spend by an astonishing 80% and boosted operational efficiency by embracing Civo's simple, reliable, and cost-effective managed Kubernetes services, enabling their teams to focus on innovation instead of infrastructure complexities.

  5. Introducing Cloud Efficiency Posture Management (CEPM): An Evolution in Cloud Optimization

    PointFive introduces a new approach to cloud cost management with Cloud Efficiency Posture Management (CEPM) — a discipline focused on optimizing cloud resource configuration, scaling, and architecture. Unlike traditional FinOps tools that emphasize spend visibility and discounts, CEPM continuously identifies root causes of inefficiency, delivers actionable insights, and embeds optimization into engineering workflows. From misconfigured DynamoDB tables to inefficient Aurora storage settings, PointFive helps teams move beyond surface-level cost savings to drive sustained performance, reliability, and cloud efficiency at scale.

  6. AI is Writing Your Code—Who’s Keeping It Secure

    AI code is the new Shadow IT, and it's already everywhere. Discover why AI-generated code is a rising security risk and get a brass-tacks guide for CISOs and security leaders to implement a layered strategy, combining governance and technical controls—with tools like Checkmarx One—to secure code at the speed of AI.

  7. What’s ‘Boardish’ and Why You Should Learn to Speak It Fluently

    CISOs, stop speaking jargon! Discover why mastering 'Boardish' – the language of business impact and financial ROI – is crucial for cybersecurity leaders. Learn how to bridge the communication gap with your board, overcome biases, secure budget buy-in, and elevate security from a cost center to a strategic business partner.

  8. ASPM is for Everyone

    ASPM isn't just for security teams anymore! Discover why developers are the new frontline in AppSec and how Checkmarx is bringing powerful Application Security Posture Management (ASPM) directly into their IDEs, unifying insights and focusing on exploitable risks for friction-free, AI-powered security.

  9. Venom Spider Targets HR Departments With Sophisticated Resume Scam

    Cybersecurity experts at Arctic Wolf Labs uncover a new phishing campaign where fake resumes hide the advanced More_eggs backdoor malware, targeting corporate HR teams.

  10. From Minecraft to Kubernetes Security: The Founding Story of Edera with Alex Zenla

    Discover Alex Zenla’s journey from Minecraft and IoT to Kubernetes security. Learn how Edera is redefining container isolation for secure, efficient cloud-native infrastructure.

  11. The 3 Es of Diskless Kafka BYOC

    Explore three ways to buy Kafka in the cloud—Multi-Tenant SaaS, Single-Tenant SaaS, and Bring Your Own Cloud (BYOC)—and discover why Diskless BYOC offers significant economic, enforcement, and enterprise discount advantages for organizations operating Kafka at scale, challenging traditional fully-managed solutions.

  12. PostgreSQL® extensions you need to know in 2025

    Uncover the pivotal role of PostgreSQL's extensions ecosystem, its historical context, and why it remains indispensable for modern data needs, including AI and analytics. Dive into key extensions like TimescaleDB, PostGIS, and pgvector, and learn how a managed service, like Aiven, mitigates risks and enhances reliability.

Items 37 to 48 of 272 total

Show per page