Twain Taylor, The New Stack

Twain Taylor

The New Stack

Bengaluru, KA, India

Contact Twain

Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.

Start free trial

Recent:
  • Unknown
Past:
  • The New Stack
  • Hacker Noon
  • DevOps.com
  • TechTarget
  • Java Code Geeks

Past articles by Twain:

Cycle.io: A Container Orchestration Platform Aimed at Developers

Kubernetes has not been able to deliver this level of multicloud portability and ease of use with containers. Cycle promises to fill this gap. → Read More

What Separates an SIEM Platform from a Logging Tool?

The fundamental difference between logging and SIEM is that logging tools are meant to improve system performance and system health, whereas SIEM tools are purpose-built for security. → Read More

Scale is an Important Consideration with SIEM Operations

Scale is an important factor to consider in any organization's SIEM operations. Find out what matters when scaling SIEM. → Read More

Istio’s Complexity Leads Some Users to Linkerd

Two users of Linkerd talk about the benefits of this open source service mesh software. → Read More

15 Considerations for Your Next Cloud Native Security Audit –

The top considerations for running applications on multicloud infrastructure; especially the importance of a security audit for these applications. → Read More

Ignite: Opsbrew Sets Sight on Multicloud Log Management –

Microsoft had recently conducted the Azure Sentinel Hackathon inviting users to build solutions for its Security Information and Event Management (SIEM) platform. Opsbrew won this hackathon for their log pipeline management tool that gathers log data from disparate sources and routes them to SIEM solutions like Azure Sentinel. Opsbrew is a “sophisticated solution for enterprises … → Read More

All Hands on Deck: Running Kubernetes within an Enterprise

Tips for running Kubernetes in-house. → Read More

Kubernetes in the House: Enterprise Options for K8s on-Prem

A review of Kubernetes distributions for running within the corporate firewall. → Read More

4 Different Approaches for Kubernetes in the Enterprise

A discussion of the differet approaches of introducing Kubernetes to the enterprise. → Read More

Achieving Open and Integrated Development with IBM Z

“DevOps” and “mainframe” are not words you often hear in the same sentence. Yet, the reality is that even in our current age of DevOps, mainframes remain → Read More

Going Cloud-Native with IBM Z as a Hybrid Cloud Platform

IBM Z features a multiple processing structure that makes it ideal for dealing with the varying bandwidth needs of modern applications. → Read More

Building Continuous Compliance into DevOps

Every organization that adopts DevOps wants to be secure and move fast at the same time. Continuous compliance is the way to achieve both of these goals. → Read More

Building a Security Feedback Process for DevOps

One of the most important processes to include to succeed at DevOps and DevSecOps is a feedback loop that reinforces constant collaboration. → Read More

The DevOps Security Stack

Although DevOps offers a more efficient and faster way to develop and deploy apps, security remains an issue. Here are some tips to make DevOps more secure. → Read More

The Biggest Security Risks Lurking in Your CI/CD Pipeline

Twistlock sponsored this post. Your CI/CD pipeline helps you achieve fast and efficient application delivery — but it does not necessarily keep your applications secure. While CI/CD offers many advantages, the speed and lack of manual oversight associated with CI/CD processes can also create new security risks. Those risks can be managed, but only if … → Read More

8 Best Practices for Container Secrets Management

Secrets management is a critical component of container security. In this post, we take a look at best practices for managing secrets (or, in other words, things like passwords, API keys and tokens) in order to mitigate container security risks and vulnerabilities. → Read More

How Knative Can Unite Kubernetes and Serverless

In this post, we look at Kubernetes-based serverless frameworks available today. We cover all the major offerings, but most of all, we give special attention to Knative. → Read More

From Agile to DevSecOps

While DevOps is a drastic shift of mindset from Agile, DevSecOps isn't a big change if you've already begun adopting DevOps practices. Essentially, DevSecOps highlights the often-neglected aspect of security across the development pipeline. → Read More

From Agile to DevSecOps

While DevOps is a drastic shift of mindset from Agile, DevSecOps isn't a big change if you've already begun adopting DevOps practices. Essentially, DevSecOps highlights the often-neglected aspect of security across the development pipeline. → Read More

Make CI/CD Fast and Secure

Both Kritis and the admission controller let you enforce automated policies for Kubernetes management. Twistlock has partnered with Google to enable support for Kritis. Twistlock leverages Kritis’ strengths to bolster its policy enforcement and image scanning features. → Read More