Filter & Sort
  1. How Zero Trust redefines traditional authentication and authorization practices

    Learn how Zero Trust redefines authentication and access control with MFA, contextual policies, and role-based access control (RBAC) for enhanced security.

    Content Type: Editorial Content
    Format: Article
    Topic: Best Practices
  2. Netsons Expands Cloud Computing Services Across Europe Using Mirantis OpenStack Private Clouds

    One of the main reasons Netsons chose Mirantis OpenStack for Kubernetes (MOSK) was the platform’s operations-centric design, which leverages Kubernetes to make updates, upgrades, and configuration much easier.

    Content Type: Case Study
    Format: Article
    Topic: Software/ Tools
  3. Kaltura’s Journey to Streamlined Development with Ox Security

    Pioneering video technology, Kaltura needed to strengthen its software supply chain and redefine its strategy for application security. Confronting obstacles in achieving agile innovation by balancing the speed and security of software releases, Kaltura needed a streamlined approach amid the complexities of accumulating numerous security tools.

    Content Type: Case Study
    Format: Article
    Topic: Best Practices
  4. Overriding variables in Terraform

    Sometimes, overriding variables in Terraform is needed for testing or using code outside its intended usage patterns. This article shows you how.

    Content Type: Editorial Content
    Format: Article
    Topic: Software/ Tools, Best Practices
  5. 6 ways available to address interoperability challenges across software systems

    Discover the six essential tools available to tackle interoperability challenges across industries in our latest blog post. 

    Content Type: Editorial Content
    Format: Article
    Topic: Best Practices
  6. Expressions in Terraform

    Expressions are one of the most powerful features of any programming language and Terraform is no expection. Version 0.12 added more powerful features.

    Content Type: Editorial Content
    Format: Article
    Topic: Best Practices
  7. Securing Kubernetes Networking with TLS Encryption: A Comprehensive Guide

    Secure Kubernetes networking with TLS encryption. Importance of networking security and a step-by-step guide to implement TLS encryption for your cluster.

    Content Type: Editorial Content
    Format: Article
    Topic: Best Practices
  8. Practical advise for DevSecOps, its just DevOps with strings attached

    With the rise in interest in security, the DevOps world is looking to integrate security into their processes. Here's how you DevSecOps.

    Content Type: Editorial Content
    Format: Article
    Topic: Best Practices
  9. 5 Different types of cloud-specific and open-source ingress controllers

    Explore the top 5 open-source ingress controllers for Kubernetes. From Istio and HAProxy to Traefik and NGINX, choose the right tool to automate traffic management and boost security.

    Content Type: Editorial Content
    Format: Article
    Topic: Best Practices
  10. 5 examples of security incidents within a Kubernetes environment

    Kubernetes has a lot of advantages but also comes with security threats. Here are some of the major ones and their response strategies.

    Content Type: Editorial Content
    Format: Article
    Topic: Best Practices
  11. The four-eyes principle: what’s important in a DevOps world

    The four-eyes principle: what's important in a DevOps world. In this article we'll cover what it is and zoom in into some practical examples.

    Content Type: Editorial Content
    Format: Article
    Topic: Best Practices
  12. 8 Recently funded startups that are based on open-source AI

    From AI to Fintech, startups are leveraging open source technologies immensely today. These organizations are attracting a lot of investor capital as well. Here’s a list of some of them.

    Content Type: Editorial Content
    Format: Article
    Topic: Software/ Tools

Items 37 to 48 of 112 total

Show per page