Filter & Sort
  1. Mitigant's cloud attack emulation: Real security testing without breaking production

    Mitigant's Nils Karn and Thomas Fricke explore cloud attack emulation—real attacks in safe environments—to test resilience and improve security with high accuracy.

  2. Breaking the Cloud Security Illusion: Putting the App Back in CNAPP

    Legacy CNAPPs lack application visibility, leaving blind spots to API abuse, data exposure, and complex attacks. True cloud security requires deep insight into application behavior and runtime activity.

  3. Sweet Demo: Intelligent Vulnerability Prioritization Using AI and Runtime Insights

    Discover how Sweet Security cuts through vulnerability noise with runtime insights and AI-driven analysis, so you can prioritize real risks, reduce alert fatigue, and protect what truly matters.

  4. Kubernetes Meetup: Special Edition Event at TomTom with Louis Ryan

    We're beyond excited to both have our first ever meetup at TomTom and an international guest speaker from Solo.io (and an important part of the Istio project): Louis Ryan!

  5. Get the evil out – don’t run containers as root

    When containers entered the stage, by default they ran as root. This poses a security risk. Get the evil out - don't run containers as root.

  6. 6 ways available to address interoperability challenges across software systems

    Discover the six essential tools available to tackle interoperability challenges across industries in our latest blog post. 

  7. Expressions in Terraform

    Expressions are one of the most powerful features of any programming language and Terraform is no expection. Version 0.12 added more powerful features.

  8. Practical advise for DevSecOps, its just DevOps with strings attached

    With the rise in interest in security, the DevOps world is looking to integrate security into their processes. Here's how you DevSecOps.

  9. 5 Different types of cloud-specific and open-source ingress controllers

    Explore the top 5 open-source ingress controllers for Kubernetes. From Istio and HAProxy to Traefik and NGINX, choose the right tool to automate traffic management and boost security.

  10. 5 examples of security incidents within a Kubernetes environment

    Kubernetes has a lot of advantages but also comes with security threats. Here are some of the major ones and their response strategies.

  11. The four-eyes principle: what’s important in a DevOps world

    The four-eyes principle: what's important in a DevOps world. In this article we'll cover what it is and zoom in into some practical examples.

  12. 8 Recently funded startups that are based on open-source AI

    From AI to Fintech, startups are leveraging open source technologies immensely today. These organizations are attracting a lot of investor capital as well. Here’s a list of some of them.

Items 1 to 12 of 175 total

Show per page