-
Get the evil out – don’t run containers as root
When containers entered the stage, by default they ran as root. This poses a security risk. Get the evil out - don't run containers as root.
Content Type: Editorial ContentFormat: ArticleTopic: Best Practices -
6 ways available to address interoperability challenges across software systems
Discover the six essential tools available to tackle interoperability challenges across industries in our latest blog post.
Content Type: Editorial ContentFormat: ArticleTopic: Best Practices -
Expressions in Terraform
Expressions are one of the most powerful features of any programming language and Terraform is no expection. Version 0.12 added more powerful features.
Content Type: Editorial ContentFormat: ArticleTopic: Best Practices -
Securing Kubernetes Networking with TLS Encryption: A Comprehensive Guide
Secure Kubernetes networking with TLS encryption. Importance of networking security and a step-by-step guide to implement TLS encryption for your cluster.
Content Type: Editorial ContentFormat: ArticleTopic: Best Practices -
De toekomst van DevSecOps
Veranderingen in DevSecOps volgen zich razend snel op. Innovaties transformeren de manier waarop organisaties software ontwikkelen, beveiligen en beheren, waardoor processen efficiënter en applicaties veiliger worden. In dit artikel behandelen we hoe dit de toekomst van DevSecOps zal vormgeven.
Content Type: Community ContentFormat: ArticleTopic: Trends & News -
Practical advise for DevSecOps, its just DevOps with strings attached
With the rise in interest in security, the DevOps world is looking to integrate security into their processes. Here's how you DevSecOps.
Content Type: Editorial ContentFormat: ArticleTopic: Best Practices -
5 Different types of cloud-specific and open-source ingress controllers
Explore the top 5 open-source ingress controllers for Kubernetes. From Istio and HAProxy to Traefik and NGINX, choose the right tool to automate traffic management and boost security.
Content Type: Editorial ContentFormat: ArticleTopic: Best Practices -
10 Infrastructure as Code (IaC) tools that can be integrated into CI/CD pipelines
Use these 10 IaC tools in your CI/CD pipeline for a more efficient, secure, and collaborative development and deployment process.
-
The Essential Guide To Kubernetes Capacity Planning: What To Look At And Why
Optimize your Kubernetes resources. Get a quick guide to capacity planning for Kubernetes, with an emphasis on setting resource limits and requests.
-
5 examples of security incidents within a Kubernetes environment
Kubernetes has a lot of advantages but also comes with security threats. Here are some of the major ones and their response strategies.
Content Type: Editorial ContentFormat: ArticleTopic: Best Practices -
The four-eyes principle: what’s important in a DevOps world
The four-eyes principle: what's important in a DevOps world. In this article we'll cover what it is and zoom in into some practical examples.
Content Type: Editorial ContentFormat: ArticleTopic: Best Practices -
8 Recently funded startups that are based on open-source AI
From AI to Fintech, startups are leveraging open source technologies immensely today. These organizations are attracting a lot of investor capital as well. Here’s a list of some of them.
Content Type: Editorial ContentFormat: ArticleTopic: Software/ Tools