Login to your Account
Create Affiliate Account
Trouble Signing In?
Enter your email below to request a Reset Password Link
-
Recruit Wizard scaled and moved to daily deployments with Octopus Cloud
Recruit Wizard transformed its software delivery by adopting Octopus Deploy for full deployment automation across Kubernetes and virtual machines. Moving from quarterly to daily deployments, the team now uses Config as Code and Runbooks to streamline releases, reduce errors, and empower non-engineering staff to run operational tasks independently. With Octopus Cloud, they’ve modernized and scaled their deployments while staying focused on growth and innovation in recruitment software.
-
The ten pillars of pragmatic deployments
Unlock the secrets to flawless software delivery! Explore the "10 Pillars of Pragmatic Deployments" that ensure repeatability, visibility, and auditability. Learn how to master rolling forward, standardize processes, and coordinate releases for robust, high-performing software pipelines.
-
Stack Overflow Uses Config as Code in Octopus for its Enterprise Solution
Stack Overflow adopted Octopus Deploy to streamline and scale its enterprise software delivery using tenanted deployments, automation, and Configuration as Code. By integrating application code, build, and deployment processes in a single GitHub repo, the team improved CI/CD efficiency, enabled better collaboration through pull requests, and reduced deployment times across multiple customers. Octopus's Azure support, API flexibility, and excellent customer service empowered Stack Overflow to standardize and mature its DevOps practices.
-
Five Reasons Standalone Vulnerability Scanning Isn’t Enough in 2025
Vulnerability scanning alone doesn’t cut it anymore. While it’s long been a core security practice, scanning tools can’t tell you which vulnerabilities are exploitable, how attackers would target them, or which ones pose real risk. This article explores the limitations of vulnerability scanning, the shortfalls of traditional vulnerability management, and why organizations must adopt a risk-based, context-driven approach to application security. Learn how to prioritize based on exploitability, integrate security across the SDLC, and move toward continuous, intelligent threat detection.
-
AI Threat Detection Tool for Modern Cyber Threats
Discover how AI threat detection transforms cybersecurity by identifying emerging threats, securing AI/ML workloads, and enabling proactive, real-time defense for cloud-native and hybrid environments.


