Login to your Account
Create Affiliate Account
Trouble Signing In?
Enter your email below to request a Reset Password Link
-
DevOps and Platform Engineering
DevOps brought developers and operations together to improve software delivery speed and reliability. Now, Platform Engineering builds on that foundation—enabling development teams with self-service tools, golden pathways, and smoother workflows. This article explores how Platform Engineering complements DevOps, supports scale without sacrificing autonomy, and helps high-performing teams reduce complexity while boosting productivity.
-
Automatic Rollbacks are a Last Resort
Automatic rollbacks might sound like a safe fallback for failed deployments, but modern software delivery tells a different story. This article explores why human-driven resilience, Continuous Delivery, and progressive delivery strategies are far more effective. Learn how deploying in small batches, using canary or blue/green strategies, and leveraging feature flags can help you respond smarter—and faster—when things go wrong.
-
Stack Overflow Uses Config as Code in Octopus for its Enterprise Solution
Stack Overflow adopted Octopus Deploy to streamline and scale its enterprise software delivery using tenanted deployments, automation, and Configuration as Code. By integrating application code, build, and deployment processes in a single GitHub repo, the team improved CI/CD efficiency, enabled better collaboration through pull requests, and reduced deployment times across multiple customers. Octopus's Azure support, API flexibility, and excellent customer service empowered Stack Overflow to standardize and mature its DevOps practices.
-
Rails debug mode enabled
Uncover the critical security risks of running Ruby on Rails in development mode on a live server, from exposing internal workings and sensitive information to increasing the risk of remote code execution and DoS attacks. Learn practical steps to safeguard your application and prevent these vulnerabilities.
-
How to store and secure sensitive data in web applications
Given the surge in web application data breaches, learn how to effectively store and secure sensitive data in your web applications. This article explores critical data types, client-side and server-side storage mechanisms, common OWASP Top 10 vulnerabilities, and essential protective measures like robust authentication, access control, and encryption strategies.
-
Guestline Saves 2,000 Hours Per Release Using Tenants in Octopus Cloud
Guestline transformed a 20-year-old manual deployment process for its EPOS software by adopting Octopus Deploy. With Octopus Cloud and tenanted deployments, Guestline automated updates to over 800 hotel customers, saving thousands of hours and significantly improving consistency and speed. The team now delivers updates twice a month, enhancing customer experience and enabling faster cloud adoption across its global footprint.
-
Recruit Wizard scaled and moved to daily deployments with Octopus Cloud
Recruit Wizard transformed its software delivery by adopting Octopus Deploy for full deployment automation across Kubernetes and virtual machines. Moving from quarterly to daily deployments, the team now uses Config as Code and Runbooks to streamline releases, reduce errors, and empower non-engineering staff to run operational tasks independently. With Octopus Cloud, they’ve modernized and scaled their deployments while staying focused on growth and innovation in recruitment software.
-
Five Reasons Standalone Vulnerability Scanning Isn’t Enough in 2025
Vulnerability scanning alone doesn’t cut it anymore. While it’s long been a core security practice, scanning tools can’t tell you which vulnerabilities are exploitable, how attackers would target them, or which ones pose real risk. This article explores the limitations of vulnerability scanning, the shortfalls of traditional vulnerability management, and why organizations must adopt a risk-based, context-driven approach to application security. Learn how to prioritize based on exploitability, integrate security across the SDLC, and move toward continuous, intelligent threat detection.
-
Master API security: Securing your entire API ecosystem with Beagle Security’s API discovery
Discover how unchecked API sprawl creates critical security blind spots for fast-growing fintech startups, leading to data breaches and operational inefficiencies. Learn how Beagle Security's API discovery feature automatically uncovers and tests all APIs within Kubernetes or Istio environments, ensuring complete visibility and proactive vulnerability management.
-
How much does pen testing cost (2025)
Explore the true costs of penetration testing in 2025, breaking down pricing by scope (web, mobile, API, cloud, network, IoT) and methodology (black box, grey box, white box). Discover key factors influencing costs and learn how AI-powered solutions like Beagle Security offer a faster, more affordable alternative to traditional pen tests.
-
AI is Writing Your Code—Who’s Keeping It Secure
AI code is the new Shadow IT, and it's already everywhere. Discover why AI-generated code is a rising security risk and get a brass-tacks guide for CISOs and security leaders to implement a layered strategy, combining governance and technical controls—with tools like Checkmarx One—to secure code at the speed of AI.
-
What’s ‘Boardish’ and Why You Should Learn to Speak It Fluently
CISOs, stop speaking jargon! Discover why mastering 'Boardish' – the language of business impact and financial ROI – is crucial for cybersecurity leaders. Learn how to bridge the communication gap with your board, overcome biases, secure budget buy-in, and elevate security from a cost center to a strategic business partner.
