Filter & Sort
  1. Secure and Scalable Kubernetes for Multi-Cluster Management

    Managing multi-cluster Kubernetes environments across clouds and data centers introduces complexity, security gaps, and observability challenges. This article explores how Calico Cluster Mesh provides seamless inter-cluster connectivity, fine-grained security policies, intelligent traffic management, and unified observability—empowering teams to build scalable, secure, and efficient Kubernetes architectures. Learn how companies like Box leverage Calico to enforce zero-trust security and simplify multi-cluster operations.

  2. Securing Kubernetes Networking with TLS Encryption: A Comprehensive Guide

    Secure Kubernetes networking with TLS encryption. Importance of networking security and a step-by-step guide to implement TLS encryption for your cluster.

  3. Security Benchmarking Authorization Policy Engines: Rego, Cedar, OpenFGA & Teleport ACD

    In collaboration with Teleport, Doyensec has developed the Security Policy Evaluation Framework (SPEF) — a dynamic testing and benchmarking tool for evaluating the security, performance, and reliability of popular authorization policy engines like Rego, Cedar, OpenFGA, and Teleport ACD. Built with modular architecture and containerized execution, SPEF allows researchers and engineers to validate policies under consistent, controlled conditions. This article walks through its architecture, supported engines, and key insights from early testing across 27 threat-driven test cases.

  4. Sidero Labs Named a Fast Mover in the 2025 GigaOm Radar for Kubernetes at the Edge

    The in-depth analyst research highlights Sidero’s Omni platform for its simplified and secure SaaS approach to deploying and managing edge-based Kubernetes clusters.

  5. Simplify Database Management with the MariaDB Enterprise Kubernetes Operator

    The MariaDB Enterprise Kubernetes Operator simplifies managing MariaDB Enterprise Platform on Kubernetes. Acting as an embedded DBA, it leverages Kubernetes Custom Resource Definitions (CRDs) to automate deployment and operation of complex MariaDB topologies, including high-availability Galera clusters and MaxScale setups, using simple YAML files. Key features include effortless deployment, seamless rolling upgrades with minimal downtime, automated backups and recovery, and enhanced security. This operator enables advanced high availability with Galera and integrated load balancing with MaxScale, unlocking enterprise-grade features. Certified for Red Hat OpenShift, it reduces operational complexity, ensures data availability and security, and is available with a MariaDB Enterprise Platform Plus subscription.

  6. Simplifying Traffic Routing in NordVPN’s Meshnet for Increased Security

    Route your internet traffic through your own devices with NordVPN’s Meshnet. Enjoy secure, private, and easy-to-set-up traffic control.

  7. SINGAPORE’S LARGEST BANK MOVES TO OPEN SOURCE WITH MARIADB

    Discover how DBS Bank, Southeast Asia's largest bank, successfully migrated mission-critical applications from Oracle to MariaDB, achieving 30-70% cost savings, enhanced flexibility with microservices, real-time data streaming, and robust compliance for its demanding financial services operations.

  8. Southeast Asia's Largest Bank Migrates to Open Source Database MariaDB

    DBS Bank, Southeast Asia's largest bank, sought to modernize its technology and reduce reliance on costly proprietary database solutions. They successfully migrated over 30 mission-critical applications, including corporate banking and payment engines, to MariaDB. This strategic move delivered 30 to 70 percent cost savings, enhanced flexibility, enabled real-time data streaming via MaxScale, and provided comprehensive monitoring with Monyog, all while ensuring compliance with strict financial regulations. DBS now champions open-source technology, sharing its success with MariaDB in the financial industry.

  9. Spotting Spear Phishing: A Business Cybersecurity Guide

    Don't get speared! Discover how targeted phishing attacks can devastate businesses and learn to spot subtle deceptions used by cybercriminals. This guide reveals how attackers gather info, craft convincing messages, and offers essential prevention tips, including how Netmaker boosts network protection.

  10. Stack Overflow Uses Config as Code in Octopus for its Enterprise Solution

    Stack Overflow adopted Octopus Deploy to streamline and scale its enterprise software delivery using tenanted deployments, automation, and Configuration as Code. By integrating application code, build, and deployment processes in a single GitHub repo, the team improved CI/CD efficiency, enabled better collaboration through pull requests, and reduced deployment times across multiple customers. Octopus's Azure support, API flexibility, and excellent customer service empowered Stack Overflow to standardize and mature its DevOps practices.

  11. Streamline DevSecOps with GitLab: Seamless integration from Code to Deployment

    This webinar "Streamline DevSecOps with GitLab: Seamless integration from Code to Deployment" is tailored to help you grasp the critical elements of DevSecOps and how GitLab's integrated tools can streamline your development processes.

  12. T-Mobile partners with Red Hat to automate network shift to cloud

    T-Mobile partners with Red Hat to automate its cloud shift, boosting network performance, reducing costs, and enhancing flexibility with OpenShift.

Items 301 to 312 of 377 total

Show per page