Curated articles, resources, tips and trends from the DevOps World.
Security performance management (SPM) and attack surface management (ASM) are two excellent approaches for managing cyber risk considering the current cyber threat landscape and the context of the world’s ongoing and accelerating digital transformation.
Here are your AWS updates from the previous 7 days. Last week I was in Turin, Italy for CloudConf, a conference I’ve had the pleasure to participate in for the last 10 years. AWS Hero Anahit Pogosova was also there sharing a few serverless tips in front of a full house.
This is the first of a three-part series. Our world is constantly evolving digitally, with data growing exponentially every second. The rise of AI technology has only accelerated this process. However, not all data is created equal. An astonishing 80% of newly generated data is unstructured.
VANCOUVER, BC — Longtime open source software aficionado Tracy Ragan urged those attending the Linux Foundation’s Open Source Summit North America in this city to get involved in the community. “Every one of us has a superpower.
Fault tolerance, no single point of failure and redundancy are prominent design principles in modern software systems. But that doesn’t mean errors, degradation, bugs or even the occasional catastrophe don’t happen.
Of the many business challenges that organizations face today, I’d argue that skill gaps are one of the most underestimated.
WebAssembly, aka Wasm, is already changing how companies deploy Kubernetes, according to Taylor Thomas, a systems engineer and director of customer engineering at Cosmonics. Fortune 100 companies are spinning down Kubernetes Clusters to use Wasm instead, he said.
A large attack surface poses significant security risks for organizations. It provides hackers with numerous opportunities to access your sensitive data. The process of attack surface reduction involves reducing all possible entry points to your sensitive resources.
Because unmanaged assets are not continuously monitored for security risks, they likely contain cybersecurity exposures, like software vulnerabilities and cloud security misconfigurations.
PCI DSS compliance is mandatory for all entities processing cardholder data, including your third-party vendors. Security reports provide a window into a vendor’s information security program, uncovering their security controls strategy and its alignment with regulations like the PCI DSS.
Have valuable insights to share with the DevOps community? Submit your article for publication.
Get the latest DevOps news, tools, and insights delivered to your inbox.
Made with pure grit © 2025 Jetpack Labs Inc. All rights reserved. www.jetpacklabs.com