The Difference Between Virtual Machines and Containers
Credit to Author: Chris Van Den Abbeele| Date: Thu, 12 May 2022 00:00:00 +0000
Discover the key differences, use cases, and benefits of virtual machines and containers.
Read moreCredit to Author: Chris Van Den Abbeele| Date: Thu, 12 May 2022 00:00:00 +0000
Discover the key differences, use cases, and benefits of virtual machines and containers.
Read moreCredit to Author: Melanie Tafelski| Date: Wed, 11 May 2022 00:00:00 +0000
This article outlines a priority checklist of which guardrails need to be applied to an existing cloud account. Answering questions like, can these guardrails be implemented without breaking anything? What level of testing is required?
Read moreCredit to Author: Mayra Rosario Fuentes| Date: Thu, 21 Apr 2022 00:00:00 +0000
Learn the impacts of cryptomining attacks for DevOps as well as mitigation strategies to bolster security without impacting time to market delivery.
Read moreCredit to Author: Melanie Tafelski| Date: Wed, 13 Apr 2022 00:00:00 +0000
With most security incidents caused by exposed secrets in DevOps pipelines and tools, proper authentication and authorization is essential. Explore the basics of strong identity management to build more resilient apps.
Read moreCredit to Author: Caitlyn Hughes| Date: Wed, 06 Apr 2022 00:00:00 +0000
Learn how the zero trust security model can be integrated into your DevOps lifecycle without implicating the agility or speed of your application build.
Read moreCredit to Author: Michael Langford| Date: Mon, 28 Mar 2022 00:00:00 +0000
A fundamental challenge of architecture built using tools like Terraform is configuration drift. Check out these actionable strategies and steps you can take to detect and mitigate Terraform drift and manage any drift issues you might face.
Read moreCredit to Author: Melanie Tafelski| Date: Tue, 22 Mar 2022 00:00:00 +0000
Vulnerabilities in software and infrastructure are a fact of life for developers and SREs. But when you understand vulnerabilities, you can minimize their impact. Learn more about five common threats and how to mitigate them.
Read moreCredit to Author: Michael Langford| Date: Wed, 09 Feb 2022 00:00:00 +0000
We explore CNAPP, the latest industry acronym coined by the Gartner report Innovation Insight for Cloud-Native Application Protection Platforms, and why devs need to know about it.
Read moreCredit to Author: Melanie Tafelski| Date: Wed, 02 Mar 2022 00:00:00 +0000
Discover 5 key security components to review and how to leverage a cloud native security platform with Mick McCluney (Trend Micro) and Kelly Griffin (AWS).
Read moreCredit to Author: Melissa Clow| Date: Wed, 16 Feb 2022 00:00:00 +0000
Discover the six pillars of the Amazon Web Services (AWS) and Azure Well-Architected Framework, examining best practices and design principles to leverage the cloud in a more efficient, secure, and cost-effective manner.
Read more