DevOps and Continuous Delivery (CI/CD)

External Article

Securing the DevOps Pipeline Part 2: Hardening Kubernetes and Cloud Security

  • Article

In Part 2, we shift our focus to securing containerized deployments and cloud infrastructure. We will cover Kubernetes security hardening, real-time monitoring, infrastructure as code (IaC) security, and shifting security left to catch misconfigurations early. These strategies will help your team secure workloads in production and respond to potential threats before they lead to a security breach.

2025-05-19

Blogs

On Speaking Well

By

Professor Patrick Winston of MIT used to give a one-hour talk about how to...

Monday Monitor Tips: Oracle Custom Metrics

By

One of the popular features of Redgate Monitor has been the ability to add...

Walking Through a Planned Failover: SQL Server Always On Availability Groups on Kubernetes

By

When building the sql-on-k8s-operator, I wanted to make sure it could handle both planned...

Read the latest Blogs

Forums

The Vector Data Type

By Steve Jones - SSC Editor

Comments posted to this topic are about the item The Vector Data Type

What Power BI DirectQuery does to your SQL Server (and how to fix it)

By kat.korson@redeagle.tech

Comments posted to this topic are about the item What Power BI DirectQuery does...

The New OS Wars

By Steve Jones - SSC Editor

Comments posted to this topic are about the item The New OS Wars

Visit the forum

Question of the Day

The Vector Data Type

What is the vector data type in SQL Server?

See possible answers