Vendor News

Amazic IT Channel Magazine

Your source for insights, technologies, and vendor news in the IT Channel.
Filter & Sort
  1. Self-hosting Feature Flags on Kubernetes with Unleash and Helm Charts

    Self-hosting feature flags with Unleash gives teams full control over their deployment, security, and scaling. Running on Kubernetes with official Helm charts simplifies production setups, enabling high availability, multi-region deployments, observability, and seamless integration into CI/CD pipelines. Treating feature flags as core platform infrastructure lets developers ship safely, maintain compliance, and scale reliably while keeping data fully within your control.

    Format: Article
    Topic: Software/ Tools
    Content Type: Community Content
  2. AI Governance Starts at Runtime

    AI governance is no longer just a policy exercise—it must operate at runtime. As organizations adopt agentic AI, securing changes in production requires runtime controls like feature flags, progressive rollout, instant rollback, and automated safeguards. This article explores how combining RBAC, change approval workflows, audit logging, and runtime governance enables faster, safer AI adoption without slowing innovation.

    Format: Article
    Topic: Software/ Tools
    Content Type: Community Content
  3. How is Platform Engineering Changing?

    Platform engineering is rapidly evolving from infrastructure management to a product-driven discipline focused on developer experience. As organizations adopt internal developer platforms, federated models, AI-powered automation, and “shift down” security, platform teams are redefining how software is built and delivered at scale. Discover the trends, metrics, and strategies shaping the future of modern DevOps and platform engineering.

    Format: Article
    Topic: Software/ Tools
    Content Type: Community Content
  4. Feature Flag Security Best Practices

    Feature flags are powerful control mechanisms — but without proper security, they can become critical vulnerabilities. This article explores best practices for securing feature flag systems, including strict RBAC enforcement, server-side authorization, secure token management, change approval workflows, immutable audit logging, and compliance alignment with frameworks like National Institute of Standards and Technology and OWASP. Learn how to treat feature flags as Tier-1 infrastructure and protect your release process from accidental or malicious misuse.

    Format: Article
    Topic: Software/ Tools
    Content Type: Community Content
  5. How to Mitigate Risks in Global Supply Chains

    The worldwide supply chain is a complex web of interconnected networks, supported by a range of global supply chain services that keep goods flowing across bord...

    Format: Article
    Topic: Best Practices
    Content Type: Community Content
  6. How AI in Cybersecurity Allows Organisations to Move from Reactive Monitoring to Active Threat Hunting

    With the technology now in place, organisations can finally transition from passive monitoring to the long-held ideal of active threat neutralisation.

    Format: Article
    Topic: Best Practices
    Content Type: Community Content
  7. Why Is Third-Party Risk Management So Important

    Why is third party risk management so important? Discover its critical role in safeguarding data, ensuring compliance, and minimizing operational risks.

    Format: Article
    Topic: Best Practices
    Content Type: Community Content
  8. Rush Street Interactive Levels Up Cloud Security with Teleport

    Online gaming leader Rush Street Interactive (RSI) chose Teleport to eliminate security friction across its multi-cloud infrastructure. Discover how Teleport delivered 3x faster access provisioning, eliminated inbound SSH ports via reverse tunnels, and secured SOC 2 Type 2 compliance by leveraging short-lived credentials for human and machine identities.

    Format: Article
    Topic: Best Practices
    Content Type: Case Study
  9. How IBM Instana uses Teleport to manage access to their cloud infrastructure

    IBM Instana needed to secure access to its sensitive cloud infrastructure while boosting developer agility. Discover why they chose Teleport to replace VPNs and shared credentials, simplifying compliance audits (SOC 2, FedRAMP) and eliminating management overhead across their rapidly scaling, multi-cloud environment.

    Format: Article
    Topic: Best Practices
    Content Type: Case Study
  10. Making the Most of Your Docker Hardened Images Trial – Part 1

    Start your DHI trial strong! This guide shows how Docker Hardened Images move you to near-zero CVEs in 3 steps. We compared official Node.js to DHI and found a 100% vulnerability elimination (25 CVEs to 0), a 90% package reduction, and 41% smaller images, validating the compliance benefits with Docker Scout and SBOMs.

    Format: Article
    Topic: Best Practices
    Content Type: Community Content
  11. Unlimited access to Docker Hardened Images: Because security should be affordable, always

    The cost of security shouldn't limit protection. Docker now offers unlimited access to its Hardened Images (DHI) catalog via an affordable subscription. Get near-zero CVEs, a 95% smaller attack surface, and SRLabs-validated security with SBOM/VEX support for every team, from ML workloads to FedRAMP-ready environments.

    Format: Article
    Topic: Software/ Tools
    Content Type: Community Content
  12. Expanding Docker Hardened Images: Secure Helm Charts for Deployments

    Docker is simplifying Kubernetes security! Discover how new Helm charts in the Docker Hardened Images (DHI) Catalog give users a secure, compliance-ready alternative after the Broadcom/Bitnami changes. Deploy DHI by default, ensuring SLSA Level 3 security and SLA-backed patching for every Kubernetes workload.

    Format: Article
    Topic: Software/ Tools
    Content Type: Community Content

Items 1 to 12 of 169 total

Show per page