Filter & Sort
  1. AppSec Uncomplicated by OX Security: Everything You Need to Know About ASPM

    Security teams face unprecedented challenges, but you don’t need to compromise your security posture.

  2. ASPM is for Everyone

    ASPM isn't just for security teams anymore! Discover why developers are the new frontline in AppSec and how Checkmarx is bringing powerful Application Security Posture Management (ASPM) directly into their IDEs, unifying insights and focusing on exploitable risks for friction-free, AI-powered security.

  3. Automatic Rollbacks are a Last Resort

    Automatic rollbacks might sound like a safe fallback for failed deployments, but modern software delivery tells a different story. This article explores why human-driven resilience, Continuous Delivery, and progressive delivery strategies are far more effective. Learn how deploying in small batches, using canary or blue/green strategies, and leveraging feature flags can help you respond smarter—and faster—when things go wrong.

  4. Automating Cloud Network Infrastructure with Kubernetes CNI Plugins

    How to manage cloud network infrastructures with Kubernetes CNI plugins

  5. Autosoft eliminated manual deployments with Octopus

    Autosoft was using TeamCity to deploy to its QA environments by uploading the build artifacts to the proper locations.

  6. Aviatrix Kubernetes Firewall: Evolving Security for Cloud-Native Environment

    Learn how Aviatrix identifies Kubernetes as a central element in ensuring cloud-native security.

  7. AWS Unveils New Tools to Power the Next Generation of AI Agents at AWS Summit New York 2025

    At AWS Summit New York 2025, AWS announces Bedrock AgentCore, a new AI agent marketplace, and a $100M boost to accelerate enterprise AI adoption.

  8. AWS VPN: Types, Benefits, and Troubleshooting Tips

    Unlock seamless, secure cloud connectivity! Explore AWS VPN types (Site-to-Site, Client VPN), their benefits, and essential setup tips. Learn how to troubleshoot common issues and discover how tools like Netmaker offer robust alternatives for building scalable, resilient networks.

  9. BERT Ransomware Shuts Down ESXi Virtual Machines to Block Recovery

    BERT ransomware shuts down VMware ESXi virtual machines before encryption, blocking recovery efforts and targeting hybrid IT environments across continents.

  10. Beyond Observability: 3 Ways Grafana Improves On-Call Workflows

    Grafana goes beyond observability, unifying alerts, logs, and traces to make on-call faster, calmer, and more collaborative.

  11. Beyond skeleton pipelines: who owns your software pipeline?

    Are your "skeleton pipelines" secretly killing your velocity? Discover the hidden cost of an "ownership vacuum" in software delivery, wasting precious dev hours. Learn why treating pipelines as a product, not an afterthought, is crucial for improving efficiency, reducing technical debt, and making every deployment a smooth success.

  12. BI on the go: Mobile BI tools to look out for in 2025

    Discover the mobile business intelligence tools that might help your business decisions in 2025

Items 85 to 96 of 379 total

Show per page