This is the second article in a series on confidential computing published originally on the…

An Introduction to Confidential Computing
This is the first article in a six-part series on Confidential Computing being featured on…

Three Key Findings from Red Hat’s 2023 State of Kubernetes Security Report
Earlier this month, Red Hat released its The State of Kubernetes Security for 2023 report. This…

DevSecOps is NOT About Security
Click-bait aside…I am tired of seeing articles and presentations about DevSecOps only to find out…

Exploring the Cyber Risks of Microservices
As the need to develop applications more quickly – at the pace of innovation –…

Technology at the edge—How cloud computing has benefitted the DHS and DoD
Over the past two decades, cloud computing has exploded in popularity among businesses, organizations, agencies,…

An Introduction to Continuous Software Engineering
If you have read my other articles, I hope you can sense my passion for…

Securing Your Open Source Software Supply Chain
This article originally appeared on the Red Hat blog. To read the original in its…

The new face of military power—How AI & ML are improving drones
Unmanned aerial vehicles (UAVs) may seem like a new advancement on the battlefield, but today’s…

An Introduction to Hardening
This article is part of a series on STIGs that was originally featured on the…