Filter & Sort
  1. How Dunelm Uses CloudQuery and Snowflake to Enhance AWS Security

    CloudQuery simplifies data movement with powerful integrations and a flexible CLI. Learn how it supports cloud asset inventory, security, compliance, and more.

  2. Committing to Safeguard Health Data with HIPAA

    DeepL has achieved HIPAA compliance, reinforcing its commitment to the highest standards of data privacy and security in healthcare. Alongside certifications like ISO 27001, SOC 2 Type 2, and GDPR, HIPAA compliance ensures strict safeguards for Protected Health Information (PHI)—from encryption and audit controls to access management and breach notifications. This milestone highlights DeepL’s dedication to protecting sensitive health data and supporting healthcare professionals with secure, trusted translation solutions.

  3. 7 Reasons Why Businesses Need To Secure AI-Driven Applications With Mend AI

    Why securing AI applications is important for businesses and how Mend AI can help protect against emerging AI threats.

  4. How Ridgeline Enhanced (And Saved Money) on Their Cloud Security with CloudQuery

    Ridgeline, a cloud-native investment management platform, improved infrastructure visibility, automated compliance, and cut cloud costs by over 30% using CloudQuery. By integrating it into their CI/CD pipeline, they scaled to 300+ AWS accounts, expanded resource coverage, and reduced manual overhead—ensuring secure, efficient, and compliant cloud operations.

  5. From Web 3.0 to Agentic AI: How Tray is Giving LLMs a Body and Brain

    Join Tray.ai CTO Alistair Russell as he traces the path from semantic web to Merlin, an agentic AI platform enabling LLMs to act with context and scale.

  6. Mastering Modern Threats: Checkpoint's Roy Barda on WAF, API, and Contextual AI 

    Explore Checkpoint’s AI-driven CloudGuard WAF with Roy Barda—proactive zero-day protection, API security, anomaly detection, and a live demo showcasing advanced threat prevention and usability.

  7. SINGAPORE’S LARGEST BANK MOVES TO OPEN SOURCE WITH MARIADB

    Discover how DBS Bank, Southeast Asia's largest bank, successfully migrated mission-critical applications from Oracle to MariaDB, achieving 30-70% cost savings, enhanced flexibility with microservices, real-time data streaming, and robust compliance for its demanding financial services operations.

  8. CNAPP, eBPF, and Beyond: How Sweet Security Delivers Runtime-First Cloud Protection

    Discover how Sweet Security’s eBPF-powered runtime protection and LLMs are revolutionizing CNAP, slashing response times, eliminating false positives, and securing cloud-native environments in real time.

  9. Beyond Compliance: Neil Levine Reveals How Anchore is Revolutionizing SBOM Management

    Explore SBOM evolution with Anchore’s Neil Levine, uncover new features, security insights, vulnerability ranking, and strategies to manage SBOM sprawl and future automation.

  10. Zero Trust Authorization for Non-Human Identities: A Deep Dive with Cerbos' Alex Olivier

    Explore non-human identity growth with Cerbos’ CPO Alex Olivier. Learn how Cerbos empowers zero-trust, real-time authorization for AI agents, IoT devices, and workloads.

  11. Is It Time to Migrate? A Practical Look at Kubernetes Ingress vs. Gateway API

    Still battling Kubernetes Ingress complexities? Discover why it's time to migrate! This guide unpacks the limitations of traditional Ingress and reveals how the Kubernetes Gateway API, implemented by Calico Ingress Gateway with Envoy proxy, offers a standardized, role-aware, and feature-rich solution for secure, streamlined traffic management.

  12. GitOps vs. DevOps: Key Differences Explained

    GitOps and DevOps are often seen as interchangeable, but they serve distinct purposes within the software delivery lifecycle. This article breaks down their differences, tools, workflows, and where they overlap. Learn how GitOps focuses on infrastructure automation using Git as the source of truth, while DevOps represents a broader cultural shift aimed at collaboration and continuous delivery. Discover how combining both approaches can streamline development, enforce consistency, and boost deployment reliability.

Items 37 to 48 of 253 total

Show per page