SoftwarePlaza IT Magazine

Connecting people and technology through news, insights, and inspiration.
Filter & Sort
  1. Article
    Airius Builds Trust
With Checkmarx’ MSSP Program

    Checkmarx’ AppSec solution helped Airius reduce transacting time, friction, and unnecessary overhead.

  2. Article
    Red Hat introduces Kubernetes-native connectivity management with Red Hat connectivity link

    Red Hat unveils Kubernetes-native solution, simplifying secure connectivity across hybrid cloud environments.

  3. Article
    Crowdstrike Set to Accelerate Threat Detection With Charlotte AI

    Learn all about Crowdstrike Charlotte AI detection triage, the Agentic AI innovation that uplifts threat detection with Crowdstrike’s cybersecurity expertise.

  4. Article
    Microsoft Enhances Kubernetes Security with AI-Powered Detection Tools

    Microsoft's AI-powered detection tools enhance Kubernetes security by detecting threats and anomalies in real time.

  5. Article
    NVIDIA AI Platform Redefines Threat Detection for Cybersecurity Providers

    Learn all about how NVIDIA’s AI Platform has been getting nods from cybersecurity providers for smarter threat detection.

  6. Article
    Blackhawk Network experienced significant benefits from implementing PointFive's solution

    Blackhawk Network, a global leader in branded payment solutions, sought to unify cloud reporting and optimization to a single platform.

  7. Article
    MyKubert - Meta’s AI-powered auto-healing for Kubernetes clusters

    Meta's AI-powered auto-healing framework for Kubernetes improves reliability, reduces downtime, and enhances scalability.

  8. Article
    9 Real-life uses of AI-driven Kubernetes to move away from traditional methods

    AI-driven Kubernetes optimizes security, scaling, and automation, transforming cloud-native operations for efficiency, resilience, and cost savings.

  9. Article
    How 1Password boosted productivity 10x by delegating IaC management with Spacelift

    By using Spacelift’s guardrails and security, we can confidently delegate much of IaC management to the individuals that own it.

  10. Article
    Effortless SBOM Analysis: How Anchore Enterprise Simplifies Integration

    As software supply chain security becomes a top priority, organizations are turning to Software Bill of Materials (SBOM) generation and analysis to gain visibility into the composition of their software and supply chain dependencies in order to reduce risk.

  11. Article
    Checkmarx Advances Software Supply Chain Security

    Software supply chain (SSC) attacks are on the rise. To protect themselves from attacks and breaches, enterprises need new solutions to secure every aspect of the SSC.

  12. Article
    Information sent using unencrypted channels

    Information sent using unencrypted channels refers to data transmitted over a network without encryption, making it vulnerable to interception, modification, or unauthorized access.

Items 37 to 48 of 496 total

Show per page