Filter & Sort
  1. Latest Advancements in Confidential Computing to Improve Data Security

    Explore how confidential computing transforms cloud security by protecting data in use, which is crucial for data-sensitive sectors.

  2. Latest GDPR 2.0 and AI Act updates to battle AI-driven data privacy risks

    Explore GDPR 2.0 and the AI Act updates, new compliance rules, and strategies to keep your AI apps privacy-compliant.

  3. Leading Global FinTech's DynamoDB Cost Optimization with PointFive

    A global FinTech giant partnered with PointFive to uncover hidden inefficiencies in their DynamoDB usage. With deep waste detection and actionable recommendations, they reduced storage costs by 60% for key tables and eliminated waste from inactive data—achieving significant savings in just 10 days without slowing innovation.

  4. Leading logistics company improves global DevOps efficiency and security with the JFrog platform

    A global leader in advanced logistics solutions has consistently pushed the boundaries of innovation in its field, providing cutting-edge technology and devices powered by advanced inspection tools, metrology systems, and computational analytics.

  5. Legal Aid Agency Hit by Major Cyberattack

    A cyberattack on the Legal Aid Agency has exposed data from 2010, and the MoJ is warning and acting fast.

  6. Leveraging Devtron for Secure CI/CD Pipelines

    Devtron bakes security into CI/CD pipelines—blocking vulnerabilities, enforcing policies, and automating compliance without slowing deployments. Kubernetes-native, audit-ready, and trusted by enterprises.

  7. List of the top Ingress controllers for Kubernetes

    Are you looking for a way to expose software services to external networks easily? Look no further than Ingress controllers for Kubernetes.

  8. LoRaWAN Explained: Protocol, Perks, and Use Cases

    Unpack LoRaWAN: the low-power, long-range protocol powering the IoT revolution! Discover its unique features, star-of-stars architecture, and diverse applications from smart cities to industrial automation. Learn how it delivers cost-effectiveness, scalability, and enhanced connectivity, and how Netmaker boosts its network security.

  9. MacOS and Kubernetes: Agoda Brought Together the Traditionally Incompatible

    Learn all about macOS-vz-Kubelet, Agoda’s answer to making macOS and Kubernetes work together.

  10. MANTRA’s $108M Fund: Propelling Blockchain Innovation

    MANTRA launches $108M fund to accelerate blockchain projects, focusing on real-world asset tokenization and DeFi. Global investors on board.

  11. MariaDB Migration Assessment Tool: How Ready Are You to Migrate to MariaDB from Oracle?

    Discover how the MariaDB Migration Assessment Tool simplifies the process of migrating from Oracle Database to MariaDB. Learn how it analyzes your Oracle schema, identifies compatibility issues, and provides actionable insights to ensure a smooth, cost-effective migration.

  12. Master API security: Securing your entire API ecosystem with Beagle Security’s API discovery

    Discover how unchecked API sprawl creates critical security blind spots for fast-growing fintech startups, leading to data breaches and operational inefficiencies. Learn how Beagle Security's API discovery feature automatically uncovers and tests all APIs within Kubernetes or Istio environments, ensuring complete visibility and proactive vulnerability management.

Items 241 to 252 of 380 total

Show per page