Latest Stories

Guidelines on how to work with InSpec and Docker.

Akshay Parvatikar
puzzle_blog_Small

Guidelines on how to work on data bags with HTTP endpoint.

Akshay Parvatikar

Enterprises need CSPM tools to power the source of truth for your cloud infrastructure, to report whether the configuration of your resources meets the best practices prescribed by various industry groups.

Sharan Rayakar

This blog discusses what's new in Chef Inspec 5.

Clinton Wolfe

Automate HA is an out of the box, enterprise grade capability which not only supports managing compliance and security grade postures of large infrastructure but also provides flexibility to do it in a cost friendly and optimized way.

Ankur Mundhra Karunesh Kumar
Blog-Desktop_100x385

Zero-Trust security model is an approach to designing and implementing IT systems, it enforces and reinforces the belief of never trust, always verify. This quick blog provides an outlook on why it is important for success and how you can implement today.

Michelle Sebek Sudeep Charles
Blog-S_Secure_-1_Small

Take Control of your Endpoint Configuration Through Automation

Sudeep Charles

Do you have an intriguing DevOps topic to share? A fun, industry-focused story to tell? Here are five reasons why you should send your proposal to be a speaker at ChefConf '22!

Michelle Sebek
Blog-Delivery_100x385_Small

Any organization looking to secure their IaC should consider these 5 best practices for securing infrastructure as code.

Kiah Tolliver