Filter & Sort
  1. Over 269,000 Websites Compromised by Obfuscated JavaScript Malware in Stealth Campaign

    Over 269,000 websites were hit in a month with obfuscated JavaScript malware, redirecting users to malicious content in a global stealth campaign.

  2. Overriding variables in Terraform

    Sometimes, overriding variables in Terraform is needed for testing or using code outside its intended usage patterns. This article shows you how.

  3. Practical advise for DevSecOps, its just DevOps with strings attached

    With the rise in interest in security, the DevOps world is looking to integrate security into their processes. Here's how you DevSecOps.

  4. Protecting Kubernetes environments with OX Security: A holistic approach to cloud-native security

    Learn how to secure your Kubernetes environments with OX Security and how it can help you manage the complexities of cloud-native architectures.

  5. Qodo Partners with Google Cloud to Give Developers Free AI Code Review Tools

    Qodo partners with Google Cloud to offer free AI code review tools for open-source devs and smarter quality checks for modern software workflows.

  6. Red Hat introduces Kubernetes-native connectivity management with Red Hat connectivity link

    Red Hat unveils Kubernetes-native solution, simplifying secure connectivity across hybrid cloud environments.

  7. Red Hat’s Acquisition of Neural Magic: Advancing the Future of Generative AI

    Red Hat acquires Neural Magic to boost AI efficiency, expand open-source AI, and enhance performance across hybrid cloud and enterprise environments.

  8. Runtime is the real defense, not just posture

    Traditional cloud security tools focus on static scans and misconfiguration checks, but they can’t keep up with today’s fast-moving threats. This article explores why runtime security — real-time monitoring and automated response — is essential for protecting dynamic cloud-native environments. Learn how shifting to a runtime-first strategy enables faster detection, proactive defense, and true resilience in the cloud.

  9. SAP and Microsoft Launch Joint Program to Accelerate Cloud ERP Adoption

    Modernise ERP with AI-driven agents, cloud-grade reliability, and partner-led adoption via SAP’s new program on Microsoft Cloud.

  10. Securing Kubernetes Networking with TLS Encryption: A Comprehensive Guide

    Secure Kubernetes networking with TLS encryption. Importance of networking security and a step-by-step guide to implement TLS encryption for your cluster.

  11. Securing the Software Supply Chain with Anchore

    Explore top container security challenges with Alan Pope from Anchore in this KubeCon interview—insights on SBOMs, compliance automation, and modern DevSecOps workflows.

  12. Sidero Labs Named a Fast Mover in the 2025 GigaOm Radar for Kubernetes at the Edge

    The in-depth analyst research highlights Sidero’s Omni platform for its simplified and secure SaaS approach to deploying and managing edge-based Kubernetes clusters.

Items 157 to 168 of 203 total

Show per page