Latest Stories

In order to migrate an application from one Windows Server Operating System to another, we have to be able to gather all of the dynamic-link libraries (“DLLs”).

Trevor Hess

Time has rolled around again and we’re looking to elect a new set of community leaders. Ideally, we’re looking for three fresh new faces! Tim, Dan, and Joseph have been working hard in the background for the past three years and we’re looking to shake things up.

Dan Webb

Chef has invested a lot with the Enterprise Automation Stack in security. With Chef InSpec you can easily scan your systems for potential vulnerabilities and then leverage Chef Infra to run remediation across your entire fleet. This is important because last week’s RubyGems vulnerability likely affected other software you have deployed that uses Ruby.

Galen Emery

At Chef, we have a cross-functional security team who evaluates and responds to potential security incidents. Because a significant portion of our code uses Ruby and Ruby libraries (known as “gems”), we have been paying close attention to the reports of malicious code insertion into several gems.

Galen Emery

Hitting the Road with Learn Chef Rally Are you concerned with securing systems and ensuring changes do not open security holes? Do you want to avoid having your changes rejected in security review or having to redo the work?

Alan Baptista

The Learn Chef Rally team is celebrating a major milestone, and you’re invited to party with us!

Jody Wolfborn

In our most recent webinar, Cloud Security Assessment for AWS Instances, we took a look at how Chef can help to secure environments in Amazon Web Services.

Nick Rycar

To meet the demands of an ever more connected world, executing on a comprehensive cloud strategy has become a critical component for organizations at any scale.

Nick Rycar

During a webinar delivered by Chef’s SVP of Products and Engineering Corey Scobie, the following five common practices used by DevOps high performers were described: Adopt a coded approach Make it easy to work with code Use the right tool for the right job Enable one way to production Shift risk mitigation left During the […]

Heather Peyton