Curated articles, resources, tips and trends from the DevOps World.
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a United States Federal Law designed to protect sensitive patient information from unauthorized disclosure, either through accidental data leakage or the result of a planned cyberattack.
As cyber attacks become more prevalent, it’s more important than ever to understand how they’re carried out. In this article, we’ll walk you through the different stages of a cyber attack.
As an ex-.NET developer, and now Developer Advocate for .NET at AWS, I’m excited to bring you this week’s Week in Review post, for reasons that will quickly become apparent! There are several updates, customer stories, and events I want to bring to your attention, so let’s dive straight in!
Cryptography is the practice of securing and transmitting data and information in a form that only authorized parties can understand.
Identity theft is a serious problem that can have a lasting impact on your life. If your identity is stolen, it can be used to open new accounts, make purchases, and commit other crimes. The impact of identity theft can be devastating, but there are steps you can take to protect yourself.
As decentralized application (dApps) developers gain more experience working with blockchains, some are running into limitations created by the parameters of blockchain architecture.
Synopsys sponsored this post. Cars are becoming more connected and more complex.
There’s been a lot of discussions recently about whether or not WebAssembly will eventually replace Docker containers.
Whalecome, dear reader, to the first issue of Dear Moby — my new advice column where I, Moby Dock, will be answering real developer questions from you, the Docker community. Ever hear of the Dear Abby column? Well, this one is better, because it’s just for developers.
Red Hat sponsored this post. CIOs, IT directors and system administrators know that disasters can happen and operations can be disrupted. Whether from a fire, flood or cybersecurity breach, sooner or later a mishap will interrupt the business.
Have valuable insights to share with the DevOps community? Submit your article for publication.
Get the latest DevOps news, tools, and insights delivered to your inbox.
Made with pure grit © 2025 Jetpack Labs Inc. All rights reserved. www.jetpacklabs.com