Filter & Sort
  1. How PerfectScale Helps a DevOps Team of One Scale Riftweaver

    Discover how Riftweaver, an innovative gaming studio with a one-person DevOps team, leveraged PerfectScale to reduce CPU throttling by nearly 59% in critical APIs, improve user experience, and enable efficient scaling of their AWS EKS Kubernetes environment, even on a free plan.

  2. How Rapyd Solved Observability Gaps to Cut K8s Costs by 40%

    Discover how fintech leader Rapyd partnered with PerfectScale to close observability gaps in their Kubernetes environment, achieving a projected 35-40% reduction in K8s costs while simultaneously improving performance and proactively resolving critical issues across their extensive AWS EKS infrastructure.

  3. How Ridgeline Enhanced (And Saved Money) on Their Cloud Security with CloudQuery

    Ridgeline, a cloud-native investment management platform, improved infrastructure visibility, automated compliance, and cut cloud costs by over 30% using CloudQuery. By integrating it into their CI/CD pipeline, they scaled to 300+ AWS accounts, expanded resource coverage, and reduced manual overhead—ensuring secure, efficient, and compliant cloud operations.

  4. How SkyHawk Security Powers their Cyber-Security Platform Data Collection with CloudQuery

    Discover how SkyHawk Security, a leading cloud cybersecurity firm, supercharged its platform by integrating CloudQuery. Learn how they streamlined multi-cloud data collection, saved engineering time, boosted performance, and ensured compliance, empowering their team to focus on core security innovations.

  5. How Teleport addresses infrastructure security identity issues and policy challenges

    Read to learn how Teleport tackles infrastructure security identity issues and policy challenges in the ever-changing IT landscape.

  6. How Teleport Simplifies Just-in-Time Access

    Just-in-time (JIT) access is essential in cloud-native environments—but many implementations fall short. Teleport transforms JIT access into a native, secure-by-default capability by embedding it directly into identity, policy, and workflow infrastructure. From automated approvals to ephemeral credentials and unified audit logging, this article explores how Teleport enables least privilege access without the manual overhead or security gaps common in traditional JIT models.

  7. How to Define and Manage SLOs Within an Organization Using Nobl9

    Understand how Nobl9 sits on top of existing telemetry data that allows users to define SLOs better.

  8. How to efficiently choose between OpenStack and Kubernetes with Rackspace

    Discover how to choose between OpenStack and Kubernetes for your cloud infrastructure needs with Rackspace.

  9. How to Make Your Internal Developer Portal Actually Useful

    Is your Internal Developer Portal (IDP) a "documentation graveyard"? Discover how fresh, accurate asset inventory transforms IDPs into dynamic platforms, boosting developer productivity by 55%, slashing onboarding time by 67%, and delivering over 224% ROI by accelerating development and ensuring governance.

  10. How to provision certificates for internal services with Teleport Workload Identity

    In today's security landscape, relying on firewalls alone is no longer enough. This article explores how Teleport Workload Identity enables secure, short-lived X.509 certificates for internal services using Mutual TLS (mTLS), eliminating long-lived secrets and enhancing workload trust. Learn how to configure and audit mTLS connections between services like NGINX and a client using SPIFFE-compliant certificates, all backed by fine-grained RBAC and detailed audit logging.

  11. How to simplify Container Management with Portainer

    Neil Cresswell shares how Portainer simplifies container management, boosts security, and supports multi-cloud deployments—plus a preview of Portainer’s latest innovations unveiled at KubeCon.

  12. How to store and secure sensitive data in web applications

    Given the surge in web application data breaches, learn how to effectively store and secure sensitive data in your web applications. This article explores critical data types, client-side and server-side storage mechanisms, common OWASP Top 10 vulnerabilities, and essential protective measures like robust authentication, access control, and encryption strategies.

Items 181 to 192 of 364 total

Show per page