Filter & Sort
  1. An Introduction to GitOps

    This blog introduces GitOps for managing applications and infrastructure using Git, explaining its core principles & benefits like enhanced security, collaboration & automation. It also compares GitOps to CI/CD and highlights how it complements existing DevOps practices.

  2. PointFive’s 2025 Strategy

    PointFive enters 2025 with a bold vision: to scale FinOps through deep engineering engagement, multi-cloud maturity, and breakthrough automation. From real-time anomaly detection to AI-powered insights, PointFive is redefining how teams approach cloud cost optimization. Learn how we’re expanding our platform, deepening partnerships, and showing the world that saving money in the cloud can be powerful—and fun.

  3. Secure and Efficient Air-Gapped Deployments: A Devtron Approach

    Deploying to air-gapped Kubernetes clusters is complex and error-prone. Devtron’s Software Distribution Hub simplifies this by automating Helm chart delivery, using private registries and a Release Operator to securely manage and monitor deployments in air gapped enviornments.

  4. Cloud Cost Efficiency at Scale: The Power of Automations

    As cloud environments grow in complexity, manual FinOps processes fall short. This article explores how automation transforms cloud cost efficiency—from resolving stale opportunities to aligning optimizations with sprint cycles. Learn how PointFive helps teams embed financial governance into engineering workflows, enabling proactive, scalable, and policy-driven cloud savings without compromising agility.

  5. 21 Essential Kubernetes Deployment Best Practices You Must Know

    Deploying on Kubernetes? Avoid common pitfalls with these 21 best practices. From optimizing YAML manifests to managing security, scaling, and observability, these tips will help you ensure smooth, reliable, and efficient deployments. Master Kubernetes the right way and streamline your workflows.

  6. Understanding Kubernetes Commands and Arguments

    Want to customize what runs inside your Kubernetes containers? This blog shows you how to use commands and arguments to override Docker defaults, with practical examples and use cases like running startup scripts and testing network connectivity.

  7. Understanding SBOM Software: The Foundation of Modern Cybersecurity

    A Software Bill of Materials (SBOM) is the key to understanding what’s inside your software—and securing it. This article explores the growing importance of SBOMs in cybersecurity, the difference between static and dynamic SBOMs, how AI is transforming their effectiveness, and best practices for managing software supply chain risk.

  8. Introducing Cloud Efficiency Posture Management (CEPM): An Evolution in Cloud Optimization

    PointFive introduces a new approach to cloud cost management with Cloud Efficiency Posture Management (CEPM) — a discipline focused on optimizing cloud resource configuration, scaling, and architecture. Unlike traditional FinOps tools that emphasize spend visibility and discounts, CEPM continuously identifies root causes of inefficiency, delivers actionable insights, and embeds optimization into engineering workflows. From misconfigured DynamoDB tables to inefficient Aurora storage settings, PointFive helps teams move beyond surface-level cost savings to drive sustained performance, reliability, and cloud efficiency at scale.

  9. 80% Less Spend, More Innovation: Krumware's Success with Civo Kubernetes

    Discover how Krumware, a leader in platform engineering, slashed cloud spend by an astonishing 80% and boosted operational efficiency by embracing Civo's simple, reliable, and cost-effective managed Kubernetes services, enabling their teams to focus on innovation instead of infrastructure complexities.

  10. Web Application Security Testing: 6 Essential Elements for 2025

    Web application security testing is more critical than ever as enterprises face growing threats and regulatory demands. This article breaks down essential components of an effective testing program—defining scope, blending automated and manual tools, integrating into the SDLC, and prioritizing risk. Learn how modern approaches like ASPM, AI, and continuous monitoring can help security teams stay ahead of evolving vulnerabilities and protect enterprise applications.

  11. How Codezero Slashed Kubernetes Setup Times from Hours to Minutes with Civo

    Discover how Codezero, a development innovation leader, revolutionized its workflow and boosted developer productivity by leveraging Civo Kubernetes. Learn how they slashed cluster setup times from hours to minutes, enabling every engineer to develop against live Kubernetes, treating environments as "disposable objects" with unparalleled support.

  12. A Costly Divide: 5 Ways to Stop AppSec and Dev from Working Against Each Other

    The disconnect between AppSec and development teams is more than a collaboration issue—it’s a major business risk. This article explores the root causes of this divide, from misaligned goals to disconnected toolchains, and offers practical strategies for uniting teams. Learn how to embed security into the developer workflow, prioritize risk over noise, and foster a culture of shared responsibility and continuous improvement.

Items 73 to 84 of 207 total

Show per page