Login to your Account
Create Affiliate Account
Trouble Signing In?
Enter your email below to request a Reset Password Link
-
From Chaos to Control: How CloudQuery Makes Cloud Data AI-Ready
Joe Karlsson explores CloudQuery’s approach to overcoming cloud data challenges, ensuring secure, accessible data for engineers, platforms, and AI builders
-
From Zanzibar to SpiceDB: Rethinking Access Control at AuthZed
AuthZed CEO Jake Moshenko unpacks relationship-based access control, explaining SpiceDB’s Zanzibar roots, fine-grained policy modeling, and how treating auth as data improves scale, caching, and agility.
-
Policies, Not Platforms: Practical Lessons for GitOps & DevEx Success
Steve Fenton reveals Octopus research insights on platform adoption, GitOps, Argo, and metrics shaping successful, secure engineering platforms.
-
Running LLMs on Kubernetes: From GPU Bottlenecks to Reliable, Production-Grade Inference
Abdel Sghiouar explores Kubernetes’ evolution, from enterprise adoption to GenAI workloads, highlighting hardware challenges, operational hurdles, and community-driven innovations.
-
How Akamas IO Uses AI to Unlock 50–90% Cloud Cost Savings with Continuous Optimization
Discover how Akamas helps enterprises cut costs, boost reliability, and optimize continuously with AI-driven configuration tuning across workloads.
-
From Kubernetes Costs to AI Bot Wars – Why Serverless Needs WebAssembly
Discover Fermyon CEO Matt Butcher’s insights on serverless at scale, WebAssembly’s cost and speed advantages, AI-driven challenges, and the CNCF Spin project’s future.
-
From Crashes to Complete Mobile Observability – Instabug on App Quality Beyond Bug Reporting
Instabug’s Mahmoud El Magdoub reveals why mobile teams must expand beyond crash reporting to embrace holistic app quality monitoring.
-
Securing AI Agents with Just-in-Time Permissions: Permit.io on Agent Identity & Consent
Permit.io CEO Or Weis introduces just-in-time permissions and ReBAC, showing how Agent Security enables safer, smarter AI agents.
-
Beyond Compliance: Neil Levine Reveals How Anchore is Revolutionizing SBOM Management
Explore SBOM evolution with Anchore’s Neil Levine, uncover new features, security insights, vulnerability ranking, and strategies to manage SBOM sprawl and future automation.
-
CNAPP, eBPF, and Beyond: How Sweet Security Delivers Runtime-First Cloud Protection
Discover how Sweet Security’s eBPF-powered runtime protection and LLMs are revolutionizing CNAP, slashing response times, eliminating false positives, and securing cloud-native environments in real time.
-
Mastering Modern Threats: Checkpoint's Roy Barda on WAF, API, and Contextual AI
Explore Checkpoint’s AI-driven CloudGuard WAF with Roy Barda—proactive zero-day protection, API security, anomaly detection, and a live demo showcasing advanced threat prevention and usability.
-
Zero Trust Authorization for Non-Human Identities: A Deep Dive with Cerbos' Alex Olivier
Explore non-human identity growth with Cerbos’ CPO Alex Olivier. Learn how Cerbos empowers zero-trust, real-time authorization for AI agents, IoT devices, and workloads.


