-
Styra releases Regal - A linter tool for the Rego policy language
Charlie Egan, Senior Developer Advocate at Styra, joins us to talk about all things OPA and demos Regal.
-
Sweet Demo: Intelligent Vulnerability Prioritization Using AI and Runtime Insights
Discover how Sweet Security cuts through vulnerability noise with runtime insights and AI-driven analysis, so you can prioritize real risks, reduce alert fatigue, and protect what truly matters.
-
Unifying the Cloud with HashiCorp: Developer Favorites, HCP Insights & KubeCon Highlights
Melissa Gurney of HashiCorp shares her DevRel journey, explores HCP’s impact, and highlights why developers rely on Terraform, Vault, and Consul—live from KubeCon.
-
Unlocking Kubernetes at Scale: Insights from Mirantis
Dominic Wilde of Mirantis discusses Kubernetes adoption challenges, introduces k0rdent for simplified operations, and shares Mirantis’ key KubeCon message and future vision in this exclusive interview.
-
Unmasking Shadow AI: Witness AI & Network Observability for the Era of Agentic AI
Explore how network-based observability helps enterprises tackle agent-based and shadow AI risks. Trevor Welsh of Witness AI shares insights on securing sensitive data and enforcing AI policies.
-
Video interview: Mirantis Lens is the Kubernetes IDE you didn’t know you needed
Edward Ionel talks about how Mirantis Lens unifies Dev & Ops around Kubernetes workflows. With unique features, a wide user base, and great flexibility, Lens is sure to ease your Kubernetes operations.
-
Zero Trust Authorization for Non-Human Identities: A Deep Dive with Cerbos' Alex Olivier
Explore non-human identity growth with Cerbos’ CPO Alex Olivier. Learn how Cerbos empowers zero-trust, real-time authorization for AI agents, IoT devices, and workloads.
-
Zitadel goes beyond basic authentication into threat intelligence & analysis of authentication data
Florian Forster, CEO & Co-Founder, Zitadel, joins us in this episode to discuss the challenges of authentication in cloud-native and Kubernetes environments, such as managing token expiration, revocation, and scalability.