Blog Posts

We explored the functionality, accuracy, performance and usability of function call tracing in Python using ARVOS to detect the runtime usage of known vulnerable code. We found that the approach is functional with 100% accuracy, but with an unfortunate 50% decrease in the performance of the traced application.

Operating secure Kubernetes platforms requires clear boundaries of what is in and out of scope of the team's responsibility. Learn why it's important, how to do it, and the greater context of scope setting.

Access control is about deciding and enforcing who gets to do what in a system. Learn the why, how, and what of Kubernetes access control.

Let us dive deeper into observability: What it is, the different types and what it technically means to implement observability.

4 alternatives to service meshes which – in our experience – are closer to what administrators are already familiar with.

What is the difference in psyche of developers and operators, what makes them great, and how can insights into this create more value?

Application dashboards over user happiness! Leverage application dashboards with Prometheus and Grafana to understand what truly matters.

In this article, we will focus on the benefits cloud native technology brings, how it brings them, and also, the greatest pitfall.