Glen Knight

NYC Based IT Professional

Common IaC Security Issues and How to Fix Them

Learn the top five Infrastructure as Code (IaC) security vulnerabilities, their fixes, and best practices to prevent misconfigurations, drifts, and breaches. Source: DevOps.com

0 Comments

Read More

Report: Full-Stack Observability Cuts Downtime Costs

The numbers are sobering, at best. A new global survey from New Relic pegs the median cost of a high-impact IT outage at $2 million per hour (that’s roughly $33,333 a minute) with a median annual hit of $76 million. That’s not just a bad week; it’s a major operational risk. And it’s landing just […]

0 Comments

Read More

INE Security Releases Industry Benchmark Report: “Wired Together: The Case for Cross-Training in Networking and Cybersecurity”

Raleigh, United States, 7th October 2025, CyberNewsWire Source: DevOps.com

0 Comments

Read More

How Can the Usage of AI Help Boost DevOps Pipelines

AI is revolutionizing DevOps by making CI/CD pipelines smarter, self-learning, and more efficient — enabling faster, secure, and automated software delivery. Source: DevOps.com

0 Comments

Read More

Introducing new compute-optimized Amazon EC2 C8i and C8i-flex instances

After launching Amazon Elastic Compute Cloud (Amazon EC2) memory-optimized R8i and R8i-flex instances and general-purpose M8i and M8i-flex instances, I am happy to announce the general availability of compute-optimized C8i and C8i-flex instances powered by custom Intel Xeon 6 processors available only on AWS with sustained all-core 3.9 GHz turbo frequency and feature a 2:1 […]

0 Comments

Read More

AWS IAM Identity Center now supports customer-managed KMS keys for encryption at rest

Starting today, you can use your own AWS Key Management Service (AWS KMS) keys to encrypt identity data, such as user and group attributes, stored in AWS IAM Identity Center organization instances. Many organizations operating in regulated industries need complete control over encryption key management. While Identity Center already encrypts data at rest using AWS-owned […]

0 Comments

Read More

How Graph Intelligence Is Transforming Software Supply Chain Visibility

At swampUP 2025 in Napa Valley, longtime JFrog collaborator and Java community veteran Stephen Chin talks about the evolution of software delivery, the fusion of graph intelligence with DevOps, and the growing need for integrated security across the software supply chain. Chin, who has worn many hats across his career — from developer advocate to […]

0 Comments

Read More

Building Faster, Safer Pipelines Through Practical Automation

At swampUP 2025, Alan Shimel spoke with Hariharan Ragothaman, a technologist and repeat attendee who has taken his passion for DevOps automation to the next level. While not a JFrog employee, Ragothaman has been a frequent participant in the JFrog community, first attending swampUP 2023 and returning this year to present a framework he developed […]

0 Comments

Read More

AWS Weekly Roundup: Amazon Bedrock, AWS Outposts, Amazon ECS Managed Instances, AWS Builder ID, and more (October 6, 2025)

Last week, Anthropic’s Claude Sonnet 4.5—the world’s best coding model according to SWE-Bench – became available in Amazon Q command line interface (CLI) and Kiro. I’m excited about this for two reasons: First, a few weeks ago I spent 4 intensive days with a global customer delivering an AI-assisted development workshop, where I experienced firsthand […]

0 Comments

Read More

Build vs. Buy: What it Really Takes to Harden Your Software Supply Chain 

When it comes to securing the software supply chain, engineering teams often assume that the choice between building their own hardened images or buying a solution is straightforward…until they try to build the images themselves. As the programmer’s credo goes: “We do these things not because they are easy, but because we thought they’d be easy.”  The decision […]

0 Comments

Read More