-
Mitigant's cloud attack emulation: Real security testing without breaking production
Mitigant's Nils Karn and Thomas Fricke explore cloud attack emulation—real attacks in safe environments—to test resilience and improve security with high accuracy.
-
Breaking the Cloud Security Illusion: Putting the App Back in CNAPP
Legacy CNAPPs lack application visibility, leaving blind spots to API abuse, data exposure, and complex attacks. True cloud security requires deep insight into application behavior and runtime activity.
-
Kubernetes Meetup: Special Edition Event at TomTom with Louis Ryan
We're beyond excited to both have our first ever meetup at TomTom and an international guest speaker from Solo.io (and an important part of the Istio project): Louis Ryan!
-
6 ways available to address interoperability challenges across software systems
Discover the six essential tools available to tackle interoperability challenges across industries in our latest blog post.
-
Expressions in Terraform
Expressions are one of the most powerful features of any programming language and Terraform is no expection. Version 0.12 added more powerful features.
-
De toekomst van DevSecOps
Veranderingen in DevSecOps volgen zich razend snel op. Innovaties transformeren de manier waarop organisaties software ontwikkelen, beveiligen en beheren, waardoor processen efficiënter en applicaties veiliger worden. In dit artikel behandelen we hoe dit de toekomst van DevSecOps zal vormgeven.
-
Practical advise for DevSecOps, its just DevOps with strings attached
With the rise in interest in security, the DevOps world is looking to integrate security into their processes. Here's how you DevSecOps.
-
5 Different types of cloud-specific and open-source ingress controllers
Explore the top 5 open-source ingress controllers for Kubernetes. From Istio and HAProxy to Traefik and NGINX, choose the right tool to automate traffic management and boost security.
-
5 examples of security incidents within a Kubernetes environment
Kubernetes has a lot of advantages but also comes with security threats. Here are some of the major ones and their response strategies.
-
The four-eyes principle: what’s important in a DevOps world
The four-eyes principle: what's important in a DevOps world. In this article we'll cover what it is and zoom in into some practical examples.
-
8 Recently funded startups that are based on open-source AI
From AI to Fintech, startups are leveraging open source technologies immensely today. These organizations are attracting a lot of investor capital as well. Here’s a list of some of them.
-
8 best data visualization tools and frameworks
Selecting the right tool for your data visualization needs can be confusing. Here are 8 tools you can choose from.