Curated articles, resources, tips and trends from the DevOps World.
Not all cloud security programs are based on open source software. CrowdStrike, a cloud and endpoint security company, offers its Falcon platform, which uses an AI running on its proprietary Threat Graph database and patented smart-filtering technology to deliver a cloud security service.
Last week I was lucky enough to attend the AWS London Summit. One of the most popular talks on the agenda was Toward Continuous Resilience with Veliswa Boya. Here’s what I learned about “continuous resilience”, and how it applies to building in AWS cloud.
In this post, we’ll talk about what Linux is, the history of Linux, and why it’s something you, your team, and your business should be (and probably already are) using. Read on!
Another successful community event done and dusted. We’re here to give you a recap of Tech Skills Day cloud track of 2022, and some key takeaways we pulled from those stellar presentations.
Business email compromise (BEC) occurs when cybercriminals scam organizations by compromising sensitive data through email accounts for financial gain. FBI research shows that BEC is currently the most costly digital crime, far surpassing ransomware to account for US$49.
First released in 1995, Java’s programming language has been a leading developer platform that has become a workhorse for hundreds of enterprise applications. With each new technology evolution, Java has successfully adapted to change.
Figure: An example run task that runs code scans using Bridgecrew. Your teams can integrate third-party tools into the Terraform Cloud workflow between any plan and apply.
Cybersecurity is one of the fastest-growing and most in-demand fields in the tech world. As technology continues to evolve, the demands of cybersecurity (and job opportunities) also grow along with it.
The latest release of the Kubernetes container orchestration engine, nicknamed “Stargazer,” looks out to better support databases, microservices and other emerging use cases, while shedding earlier missteps that have stymied the K8s core developers’ productivity.
Counchbase sponsored this post. You’re hungry for a pizza as you compose a post to your newly found group on a professional website from your mobile phone when the phone buzzes with a Happy Hour coupon for your favorite pizza on your next order.
Have valuable insights to share with the DevOps community? Submit your article for publication.
Get the latest DevOps news, tools, and insights delivered to your inbox.
Made with pure grit © 2025 Jetpack Labs Inc. All rights reserved. www.jetpacklabs.com