SoftwarePlaza IT Magazine

Connecting people and technology through news, insights, and inspiration.
Filter & Sort
  1. Article
    Reducing MTTR with Grafana Cloud: Inside ASOS’ observability stack

    To deliver on that experience time and time again, the ASOS engineering team relies on Grafana Cloud for real-time observability.

  2. Article
    Researchers Warn of AI-Powered “Ransomware 3.0” Capable of Fully Autonomous Attacks

    NYU researchers reveal AI-driven ransomware that can run attacks end-to-end, sparking urgent calls for stronger cybersecurity defenses.

  3. Article
    Runtime is the real defense, not just posture

    Traditional cloud security tools focus on static scans and misconfiguration checks, but they can’t keep up with today’s fast-moving threats. This article explores why runtime security — real-time monitoring and automated response — is essential for protecting dynamic cloud-native environments. Learn how shifting to a runtime-first strategy enables faster detection, proactive defense, and true resilience in the cloud.

  4. Article
    Samsung SDS Cuts Database Costs in Half by Moving from Oracle to MariaDB

    Samsung SDS, a Samsung subsidiary, needed to modernize its Knox Portal, an internal collaboration platform with almost half a million users, by moving to a microservices architecture and open-source software. Facing high operating costs with Oracle, they migrated over 80% of their databases for this critical application to MariaDB Enterprise Server. This transition achieved zero-downtime upgrades, global real-time data synchronization, and a more than 50% reduction in operating costs, ensuring service continuity and stability for 80 Samsung affiliates worldwide. MariaDB's transparency and performance proved to be a cost-effective choice, enhancing developer and DBA capabilities.

  5. Article
    SAP and Microsoft Launch Joint Program to Accelerate Cloud ERP Adoption

    Modernise ERP with AI-driven agents, cloud-grade reliability, and partner-led adoption via SAP’s new program on Microsoft Cloud.

  6. Article
    Say Hello to AWS Cost and Usage Reports Integration and Report in CloudQuery

    CloudQuery announces its new AWS Cost and Usage Reports (CUR) integration—empowering engineering teams to analyze and optimize cloud spend directly from infrastructure data. Learn how to gain cost visibility, allocate budgets by tags or teams, and uncover hidden cloud expenses with powerful queries and dashboards.

  7. Article
    Scaling Docker Usage with JFrog

    Worried about Docker Hub rate limits? Discover how JFrog’s universal artifact manager and container registry ensures uninterrupted Docker usage by proxy caching, enabling authentication, and providing unlimited public Docker Hub downloads via JFrog SaaS, helping you scale seamlessly.

  8. Article
    Secure and Efficient Air-Gapped Deployments: A Devtron Approach

    Deploying to air-gapped Kubernetes clusters is complex and error-prone. Devtron’s Software Distribution Hub simplifies this by automating Helm chart delivery, using private registries and a Release Operator to securely manage and monitor deployments in air gapped enviornments.

  9. Article
    Secure and Scalable Kubernetes for Multi-Cluster Management

    Managing multi-cluster Kubernetes environments across clouds and data centers introduces complexity, security gaps, and observability challenges. This article explores how Calico Cluster Mesh provides seamless inter-cluster connectivity, fine-grained security policies, intelligent traffic management, and unified observability—empowering teams to build scalable, secure, and efficient Kubernetes architectures. Learn how companies like Box leverage Calico to enforce zero-trust security and simplify multi-cluster operations.

  10. Article
    Securing Kubernetes Networking with TLS Encryption: A Comprehensive Guide

    Secure Kubernetes networking with TLS encryption. Importance of networking security and a step-by-step guide to implement TLS encryption for your cluster.

  11. Article
    Security Benchmarking Authorization Policy Engines: Rego, Cedar, OpenFGA & Teleport ACD

    In collaboration with Teleport, Doyensec has developed the Security Policy Evaluation Framework (SPEF) — a dynamic testing and benchmarking tool for evaluating the security, performance, and reliability of popular authorization policy engines like Rego, Cedar, OpenFGA, and Teleport ACD. Built with modular architecture and containerized execution, SPEF allows researchers and engineers to validate policies under consistent, controlled conditions. This article walks through its architecture, supported engines, and key insights from early testing across 27 threat-driven test cases.

  12. Article
    Security Matters. Here’s How We Bake It Into Everything We Do

    At Spectro Cloud, security isn’t an afterthought — it’s built into everything we do. From our zero-trust architecture and continuous vulnerability management to certifications like FedRAMP, FIPS, SOC 2, and ISO 27001, we ensure customers can innovate confidently and securely across any Kubernetes environment. Discover how we embed security into our culture, technology, and every layer of Palette and Palette VerteX.

Items 337 to 348 of 434 total

Show per page