Filter & Sort
  1. Understanding Kubernetes Commands and Arguments

    Want to customize what runs inside your Kubernetes containers? This blog shows you how to use commands and arguments to override Docker defaults, with practical examples and use cases like running startup scripts and testing network connectivity.

  2. Understanding SBOM Software: The Foundation of Modern Cybersecurity

    A Software Bill of Materials (SBOM) is the key to understanding what’s inside your software—and securing it. This article explores the growing importance of SBOMs in cybersecurity, the difference between static and dynamic SBOMs, how AI is transforming their effectiveness, and best practices for managing software supply chain risk.

  3. Unifying the Cloud with HashiCorp: Developer Favorites, HCP Insights & KubeCon Highlights

    Melissa Gurney of HashiCorp shares her DevRel journey, explores HCP’s impact, and highlights why developers rely on Terraform, Vault, and Consul—live from KubeCon.

  4. Unlocking Kubernetes at Scale: Insights from Mirantis

    Dominic Wilde of Mirantis discusses Kubernetes adoption challenges, introduces k0rdent for simplified operations, and shares Mirantis’ key KubeCon message and future vision in this exclusive interview.

  5. Unmasking Shadow AI: Witness AI & Network Observability for the Era of Agentic AI

    Explore how network-based observability helps enterprises tackle agent-based and shadow AI risks. Trevor Welsh of Witness AI shares insights on securing sensitive data and enforcing AI policies.

  6. Use Of Open Source IT Monitoring Tools in 2025

    A deep dive into popular open-source monitoring tools like Prometheus and Grafana and how to use them risk-free

  7. Valuable insights for organizations navigating NIS2 compliance

    Discover valuable insights for navigating NIS2 compliance, from expanded scope and stricter security requirements to increased accountability.

  8. Venom Spider Targets HR Departments With Sophisticated Resume Scam

    Cybersecurity experts at Arctic Wolf Labs uncover a new phishing campaign where fake resumes hide the advanced More_eggs backdoor malware, targeting corporate HR teams.

  9. Video interview: Mirantis Lens is the Kubernetes IDE you didn’t know you needed

    Edward Ionel talks about how Mirantis Lens unifies Dev & Ops around Kubernetes workflows. With unique features, a wide user base, and great flexibility, Lens is sure to ease your Kubernetes operations.

  10. Visma Proceedo Migrates to MariaDB unlocking more than 2x better response times and cost savings

    Visma Proceedo, a critical purchase-to-pay cloud solution in the Nordic region serving nearly a million users and processing 12 million invoices yearly with over 20TB of data, faced limitations and rising costs with its legacy proprietary database. After a two-year migration project, Visma successfully transitioned to MariaDB Enterprise Server. This move significantly improved average response times from 1.5-2 seconds to under 700 milliseconds and achieved roughly 10% annual savings in license and support costs. MariaDB's support and proactive improvement proposals also exceeded expectations.

  11. Visualize & Govern Your Cloud Stack with CloudQuery Reports

    CloudQuery Reports delivers powerful, pre-built dashboards for security, compliance, operations, and cost across your multi-cloud stack—no deep cloud or SQL expertise needed. Get full visibility and control over your infrastructure in one place.

  12. Volkswagen Car Hack Exposes Personal Data and Service Records

    Flaws in Volkswagen’s connected car app exposed user data and service history.

Items 385 to 396 of 421 total

Show per page