spot_imgspot_imgspot_imgspot_img

Development

Security tools: what business professionals want

In one of my previous articles, I outlined the considerations to select a tool for enterprise-grade businesses. Most often the tech guys come up with the functional requirements. But it's more than that. Business representatives as well as (senior) managers and personnel from legal and compliance departments have a...

Are you ready for DevSecOps? Five key indicators to think about it twice

Everyone talks about DevSecOps nowadays. A lot of companies implement the main concepts of it. Some of them are pretty successful while others face major (organizational) challenges. It's great to hear the success stories of the companies that are well on their way. However, it's also extremely valuable to...

Open source software in the cloud – from a closed door to an open world

Open-source software continues to be on the rise. Not only do consumers use very powerful applications in their daily lives, but companies as well. More and more organizations adopt open source solutions (in the cloud) to fulfill their business needs. The same is true for third-party dependencies and/or libraries...

A detailed guide for your Incident Response Plan

Every company that builds or maintains software should have an incident response plan at hand. If you do not have one, it's best to create it before an attacker compromises your system. A response plan is needed to fight incidents in the best possible way using a structured approach....
00:36:43

Video interview: A deeper understanding of how to approach Kubernetes storage

From PVs and PVCs to the top open source projects, and Portworx’s unique offerings like stretch clusters, Joe Gardiner of Portworx leaves no stone unturned in this insightful interview on Kubernetes storage. Watch it to gain a deeper understanding of how to approach Kubernetes storage for your organization. Watch the video or read...

What changes with storage when you move from a traditional setup to Kubernetes

Kubernetes is a container orchestration tool that is revolutionizing the way applications are being deployed and developed. With the rise of microservice architecture and infrastructure the coupling from the application, developers are focusing more on delivering value while building their software and applications. With Kubernetes, developers can describe the memory...

Testing your IaC templates: methods and tools to remember

Forget the days of manual provisioning and manual maintenance of your Virtual Machines, network infrastructure, firewalls, and security groups. Your infrastructure is created based on IaC templates. Since application deployments depend on it, it's important to have a reliable target environment. Those IaC templates need to be tested to...

Centralized vs decentralized security – What does the cloud need?

A new dawn of advanced technology is upon us. Although the idea of powerful, smarter, and more agile solutions is enticing, it comes riddled with various security vulnerabilities and an increasing need to defend complex ecosystems. As more organizations adopt a digital-first, data-driven attitude, the amount of data increases...

Kubernetes Storage 101 – All You Need to Know to Get Started

The trend of containerizing applications and managing them with an orchestrator like Kubernetes is still new. As with all budding technologies, there is a lot of curiosity and even some ambiguity around it. In this article, let us decode all about one aspect of Kubernetes - storage. You’ll get...

Kubernetes monitoring – What metrics to look at when managing Kubernetes

Kubernetes is rapidly becoming the most popular container orchestrator in the modern IT environment. However, Kubernetes deployments are massive – extending up to several thousand containers. The large number of containers introduce several complexity and challenges in operations. The first step to manage Kubernetes effectively is to proactively detect...