Latest DevOps Articles

Latest DevOps Articles curated daily from around the web.


Apache Log4j 2, a Java-based logging library, was affected by a zero-day vulnerability on December 9, 2021.
As we kick off 2024, I wanted to take a moment to highlight the top posts from 2023. Without further ado, here are the top 10 AWS DevOps blog posts of 2023. A b...
The dust has settled after another re:Invent. I once again had the privilege of organizing the DevOps and Developer Productivity (DOP) track along with Jessie V...
Shirts painstakingly handcrafted by under-caffeinated developers. Shirts painstakingly handcrafted by under-caffeinated developers.
Open ports that direct traffic to and from machines in the office could become an attack vector, especially as more employees return to a physical office enviro...
This post was contributed by Docker Captain Vladimir Mikhalev. Happy New Year, Docker Fans! I hope your 2024 is off to a great start. Whether you’re a Docker ex...
Generative AI coding tools are changing the way developers accomplish day-to-day development tasks. From generating functions to creating unit tests, these tool...
Enterprises are constantly seeking ways to accelerate their journey to the cloud. Infrastructure as code (IaC) is crucial for automating and managing cloud reso...
Digital Ocean Providing developers and businesses a reliable, easy-to-use cloud computing platform of virtual servers (Droplets), object storage ( Spaces), and more.
Informatica is one of the most widely used software platforms in the financial services sector, performing business-critical data management and governance func...
Cybersecurity is becoming a critical concern as various industries depend on digital infrastructure.
Google Safe Browsing is a set of policies to help users remain protected and aware of potential security threats when using Google products. Google has offered...
Modern healthcare heavily relies on third-party vendors for various services such as IT solutions, supply chain logistics, and more. As healthcare organizations...
Shirts painstakingly handcrafted by under-caffeinated developers. Shirts painstakingly handcrafted by under-caffeinated developers.
Storing large amounts of sensitive data and allocating minimal resources to cybersecurity makes the education sector attractive to cybercriminals.
Severe cyber threats often threaten the technology sector because of the level of sensitive data companies and their third-party vendors process and store.
The healthcare industry stores an abundance of sensitive information and relies on third-party vendors for critical business services, two factors that make the...
Cloud is now a mature technology. Its adoption is of strategic importance for insurance businesses, and leaders must balance the risks and opportunities. Simply...