Curated articles, resources, tips and trends from the DevOps World.
Tigera sponsored this post. Insight Partners is an investor in Tigera and TNS. This is the companion article to ​​”Interconnect Security Risks to Protect Your Kubernetes Environment.
Identity and access management is the cornerstone of cloud security. It’s also the most complex product to understand. It often leads to a failure to assign the least number of privileges necessary.
Building a platform engineering platform for your company is a big task, with lots of critical decisions that must be made. But perhaps the most important decision that must be tackled first is deciding where to start building the platform — from the frontend or from its backend.
No one wants to fail at microservices. No one sets out to do that. But it’s easy to do given the difficulty of microservices and the surprising number of ways we can fail. I’m usually an advocate for microservices, at least where they are warranted and when implemented well.
Cyber supply chain risk management (C-SCRM) is the process of identifying, assessing, and mitigating cybersecurity risks associated with an organization’s supply chain.
Today, we’re announcing the general availability of AWS Supply Chain Analytics powered by Amazon QuickSight. This new feature helps you to build custom report dashboards using your data in AWS Supply Chain.
The cloud native computing stack has finally gotten its own dedicated operating system. Built on containers, Flatcar Container Linux, a derivative of the CoreOS distribution, has been accepted as an incubation project by the Cloud Native Computing Foundation.
RALEIGH, N.C. — Developers want to build cool stuff. But to have a future as a developer in the 2020s, they need flexibility, according to panelists at a New Stack-led session at All Things Open.
Deb Nicholson, executive director of the Python Software Foundation, believes she knows why Python has become one of the most popular programming languages in the world.
Recently, we launched a new AWS Cloud Development Kit (CDK) L2 construct for Amazon CloudFront Origin Access Control (OAC). This construct simplifies the configuration and maintenance of securing Amazon Simple Storage Service (Amazon S3) CloudFront origins with CDK.
Have valuable insights to share with the DevOps community? Submit your article for publication.
Get the latest DevOps news, tools, and insights delivered to your inbox.
Made with pure grit © 2026 Jetpack Labs Inc. All rights reserved. www.jetpacklabs.com