Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
Kubernetes has not been able to deliver this level of multicloud portability and ease of use with containers. Cycle promises to fill this gap. → Read More
The fundamental difference between logging and SIEM is that logging tools are meant to improve system performance and system health, whereas SIEM tools are purpose-built for security. → Read More
Scale is an important factor to consider in any organization's SIEM operations. Find out what matters when scaling SIEM. → Read More
Two users of Linkerd talk about the benefits of this open source service mesh software. → Read More
The top considerations for running applications on multicloud infrastructure; especially the importance of a security audit for these applications. → Read More
Microsoft had recently conducted the Azure Sentinel Hackathon inviting users to build solutions for its Security Information and Event Management (SIEM) platform. Opsbrew won this hackathon for their log pipeline management tool that gathers log data from disparate sources and routes them to SIEM solutions like Azure Sentinel. Opsbrew is a “sophisticated solution for enterprises … → Read More
Tips for running Kubernetes in-house. → Read More
A review of Kubernetes distributions for running within the corporate firewall. → Read More
A discussion of the differet approaches of introducing Kubernetes to the enterprise. → Read More
“DevOps” and “mainframe” are not words you often hear in the same sentence. Yet, the reality is that even in our current age of DevOps, mainframes remain → Read More
IBM Z features a multiple processing structure that makes it ideal for dealing with the varying bandwidth needs of modern applications. → Read More
Every organization that adopts DevOps wants to be secure and move fast at the same time. Continuous compliance is the way to achieve both of these goals. → Read More
One of the most important processes to include to succeed at DevOps and DevSecOps is a feedback loop that reinforces constant collaboration. → Read More
Although DevOps offers a more efficient and faster way to develop and deploy apps, security remains an issue. Here are some tips to make DevOps more secure. → Read More
Twistlock sponsored this post. Your CI/CD pipeline helps you achieve fast and efficient application delivery — but it does not necessarily keep your applications secure. While CI/CD offers many advantages, the speed and lack of manual oversight associated with CI/CD processes can also create new security risks. Those risks can be managed, but only if … → Read More
Secrets management is a critical component of container security. In this post, we take a look at best practices for managing secrets (or, in other words, things like passwords, API keys and tokens) in order to mitigate container security risks and vulnerabilities. → Read More
In this post, we look at Kubernetes-based serverless frameworks available today. We cover all the major offerings, but most of all, we give special attention to Knative. → Read More
While DevOps is a drastic shift of mindset from Agile, DevSecOps isn't a big change if you've already begun adopting DevOps practices. Essentially, DevSecOps highlights the often-neglected aspect of security across the development pipeline. → Read More
While DevOps is a drastic shift of mindset from Agile, DevSecOps isn't a big change if you've already begun adopting DevOps practices. Essentially, DevSecOps highlights the often-neglected aspect of security across the development pipeline. → Read More
Both Kritis and the admission controller let you enforce automated policies for Kubernetes management. Twistlock has partnered with Google to enable support for Kritis. Twistlock leverages Kritis’ strengths to bolster its policy enforcement and image scanning features. → Read More