What is Multi-Cloud?

What is Multi-Cloud?

A starter guide—published by Veeam—introducing the concept of multi-cloud and its popularity. The article discusses how to build a multi-cloud strategy, how to deploy, how to protect your data, and more.

Read More

Everything you Need to Know About Kubernetes DaemonSets

Everything you Need to Know About Kubernetes DaemonSets

A beginner-intermediate guide—published by ContainIQ—explaining the various mechanisms and benefits of DaemonSets in Kubernetes. The article provides code examples, use cases, and tips for harnessing these powerful objects.

Read More

Fundamentals of DevOps

Fundamentals of DevOps

Introductory guide explaining some core principles of DevOps, and why they’re integral to building quality software. The brief eBook chapter defines common terminology—and how each development-pipeline stage feeds into the next.

Read More

The Essential Guide to Kubernetes Service Discovery

The Essential Guide to Kubernetes Service Discovery

Detailed guide—published by Lightrun—explaining the ins and outs of service discovery in Kubernetes. The piece breaks down Kubernetes services as they relate to core components within the system.

Read More

Web Application Attack Vectors Every Developer Should Know

Web Application Attack Vectors Every Developer Should Know

Introductory guide—published by Fingerprint.js—that explains the current landscape of web-application security. The article analyzes common attack vectors, their damaging potential, and steps teams might take to safeguard their web apps.

Read More

How Much are Leaked Credentials Selling for on the Dark Web?

How Much are Leaked Credentials Selling for on the Dark Web?

Analysis article—published by Specops—outlining the existing threats to user credentials worldwide. The piece examines the market for leaked credentials, and offers best practices for galvanizing one’s own systems against attacks.

Read More

How to Audit Password Changes in Active Directory

How to Audit Password Changes in Active Directory

Technical explainer—published by Specops Software—outlining how to vet password changes using Active Directory. The guide summarizes best practices around password changes. It also describes how admins may leverage available management tools.

Read More