SoftwarePlaza IT Magazine

Connecting people and technology through news, insights, and inspiration.
Filter & Sort
  1. Article
    7 Ways PointFive Automates Daily Cloud Operations for Efficiency and Scale

    Explore seven ways PointFive automates daily cloud operations to cut waste, improve reliability, and scale faster.

  2. Article
    Check Point Unveils ThreatCloud NextGen: AI-Powered Threat Intelligence for Real-Time Attack Prevention

    Check Point unveils ThreatCloud NextGen, an AI-powered threat intelligence platform delivering real-time cyberattack prediction and prevention for modern enterprises.

  3. Article
    How to Automate API Security with SecureBlink

    Automate API security effortlessly with SecureBlink and protect your applications with continuous monitoring and smart vulnerability remediation.

  4. Video
    Reimagining Observability: How Splunk is Powering the Future with OpenTelemetry

    Discover how Splunk’s Steve Flanders drives innovation in observability through OpenTelemetry, enabling vendor-neutral telemetry, scalable data pipelines, and AI-driven insights for cloud-native system reliability.

  5. Article
    Rush Street Interactive Levels Up Cloud Security with Teleport

    Rush Street Interactive strengthened its multi-cloud security by adopting Teleport’s unified access platform, replacing SSH keys and VPN friction with short-lived credentials, SSO, RBAC, and reverse tunnels. The result: faster onboarding, reduced attack surface, streamlined compliance, and highly secure access for both engineers and automation workflows.

  6. Article
    How IBM Instana uses Teleport to manage access to their cloud infrastructure

    IBM Instana needed to secure access to its sensitive cloud infrastructure while boosting developer agility. Discover why they chose Teleport to replace VPNs and shared credentials, simplifying compliance audits (SOC 2, FedRAMP) and eliminating management overhead across their rapidly scaling, multi-cloud environment.

  7. Article
    Unlimited access to Docker Hardened Images: Because security should be affordable, always

    The cost of security shouldn't limit protection. Docker now offers unlimited access to its Hardened Images (DHI) catalog via an affordable subscription. Get near-zero CVEs, a 95% smaller attack surface, and SRLabs-validated security with SBOM/VEX support for every team, from ML workloads to FedRAMP-ready environments.

  8. Article
    Making the Most of Your Docker Hardened Images Trial – Part 1

    Start your DHI trial strong! This guide shows how Docker Hardened Images move you to near-zero CVEs in 3 steps. We compared official Node.js to DHI and found a 100% vulnerability elimination (25 CVEs to 0), a 90% package reduction, and 41% smaller images, validating the compliance benefits with Docker Scout and SBOMs.

  9. Article
    Expanding Docker Hardened Images: Secure Helm Charts for Deployments

    Docker is simplifying Kubernetes security! Discover how new Helm charts in the Docker Hardened Images (DHI) Catalog give users a secure, compliance-ready alternative after the Broadcom/Bitnami changes. Deploy DHI by default, ensuring SLSA Level 3 security and SLA-backed patching for every Kubernetes workload.

  10. Article
    Docker Hardened Images: crafted by humans, protected by AI

    Docker’s Hardened Images (DHI) are secured by a dual approach: human expertise backed by AI. Discover how Docker’s internal AI guardrail spotted a critical logic flaw in an nginx-exporter update, blocked the release, and contributed the fix upstream, proving AI is the best force multiplier for security architects

  11. Video
    Redefining Enterprise Storage with Infinidat

    Eric Herzog reveals how Infinidat revolutionizes enterprise storage with performance, resilience, simplicity, cyber-storage, AI automation, and scalable reliability to solve modern IT challenges for organizations.

  12. Video
    Redefining Reliability: How Komodor is Building the Future of AI-Driven SRE

    Discover how Komodor’s Claudia AI revolutionizes Kubernetes reliability through autonomous issue detection, investigation, and remediation powered by multi-agent AI systems.

Items 13 to 24 of 391 total

Show per page