NEWS
- ‣ Trend Micro Attacks on Cryptomining Docker
- ‣ Amazon Launches for CloudFront Security Savings Bundle
- ‣ Google's cloud business lost over $ 5.5 billion last year
- ‣ Microsoft Azure Functions Vulnerable to Docker Escape Bug
- ‣ Pinecone, a serverless vector database for machine learning, leaves stealth with $10M funding
- ‣ Researchers detect new malware targeting Kubernetes clusters to mine Monero
- ‣ GitLab Changes its Pricing Plan; Drops Starter Tier
- ‣ Microsoft Security Business Surpasses $10 Billion in Revenue
- ‣ Researchers uncover a 10-year old vulnerability in Linux
- ‣ IBM Introduces New Cloud Pricing
- ‣ AWS to offer free eight-week training
- ‣ IBM acquires cloud consultancy firm - Taos Mountain
- ‣ Driftctl: A Tool to detect Infrastructure Drifts
- ‣ New Work From Home Expansion From OpsRamp Network.
Latest stories
Prometheus Remote Storage
Prometheus can be configured to read from and write to remote storage, in addition to …
Continuous Delivery Pipeline for Kubernetes Using Spinnaker
Kubernetes is now the de-facto standard for container orchestration. With more and more organizations adopting …
Kubernetes YAML: Enforcing best practices and security policies in CI/CD and GitOps pipelines
Using Kubernetes is a synonym for manipulating YAML.Even if the YAML community describes it as …
Top 10 Kubernetes CI/CD Tools
A CI/CD pipeline in a Kubernetes based environment is usually composed of 4 main components: …
CI/CD Pipelines for Kubernetes Applications
In the first post of a three-part series, get started on understanding CI/CD pipelines for …
Microapps vs Microservices
Microservices and microapps are both core components of today's application development. Take a look at …