Login to your Account
Create Affiliate Account
Trouble Signing In?
Enter your email below to request a Reset Password Link
-
Introducing Cloud Efficiency Posture Management (CEPM): An Evolution in Cloud Optimization
PointFive introduces a new approach to cloud cost management with Cloud Efficiency Posture Management (CEPM) — a discipline focused on optimizing cloud resource configuration, scaling, and architecture. Unlike traditional FinOps tools that emphasize spend visibility and discounts, CEPM continuously identifies root causes of inefficiency, delivers actionable insights, and embeds optimization into engineering workflows. From misconfigured DynamoDB tables to inefficient Aurora storage settings, PointFive helps teams move beyond surface-level cost savings to drive sustained performance, reliability, and cloud efficiency at scale.
-
From Alerts to Actions: Turning AppSec Data into Business Value
Modern AppSec teams are overwhelmed with alerts but still struggle to answer the one question that matters: What should we fix first? This article explores how shifting from raw data to contextual insights helps prioritize the most impactful vulnerabilities, align security efforts with business goals, and move application security from a cost center to a strategic enabler.
-
Understanding Kubernetes Commands and Arguments
Want to customize what runs inside your Kubernetes containers? This blog shows you how to use commands and arguments to override Docker defaults, with practical examples and use cases like running startup scripts and testing network connectivity.
-
The ten pillars of pragmatic deployments
At Octopus, we've distilled years of deployment experience into the 10 Pillars of Pragmatic Deployments — a flexible, experience-driven framework to help teams build reliable, repeatable, and user-friendly software deployments. From understanding repeatable and verifiable deployments to achieving seamless cutovers with smart strategies like rolling updates and canary deployments, this guide walks you through modern deployment best practices that work in the real world — not just in theory.
-
DevOps and Platform Engineering
DevOps brought developers and operations together to improve software delivery speed and reliability. Now, Platform Engineering builds on that foundation—enabling development teams with self-service tools, golden pathways, and smoother workflows. This article explores how Platform Engineering complements DevOps, supports scale without sacrificing autonomy, and helps high-performing teams reduce complexity while boosting productivity.
-
Automatic Rollbacks are a Last Resort
Automatic rollbacks might sound like a safe fallback for failed deployments, but modern software delivery tells a different story. This article explores why human-driven resilience, Continuous Delivery, and progressive delivery strategies are far more effective. Learn how deploying in small batches, using canary or blue/green strategies, and leveraging feature flags can help you respond smarter—and faster—when things go wrong.
-
Stack Overflow Uses Config as Code in Octopus for its Enterprise Solution
Stack Overflow adopted Octopus Deploy to streamline and scale its enterprise software delivery using tenanted deployments, automation, and Configuration as Code. By integrating application code, build, and deployment processes in a single GitHub repo, the team improved CI/CD efficiency, enabled better collaboration through pull requests, and reduced deployment times across multiple customers. Octopus's Azure support, API flexibility, and excellent customer service empowered Stack Overflow to standardize and mature its DevOps practices.
-
Rails debug mode enabled
Uncover the critical security risks of running Ruby on Rails in development mode on a live server, from exposing internal workings and sensitive information to increasing the risk of remote code execution and DoS attacks. Learn practical steps to safeguard your application and prevent these vulnerabilities.
-
How to store and secure sensitive data in web applications
Given the surge in web application data breaches, learn how to effectively store and secure sensitive data in your web applications. This article explores critical data types, client-side and server-side storage mechanisms, common OWASP Top 10 vulnerabilities, and essential protective measures like robust authentication, access control, and encryption strategies.
-
Guestline Saves 2,000 Hours Per Release Using Tenants in Octopus Cloud
Guestline transformed a 20-year-old manual deployment process for its EPOS software by adopting Octopus Deploy. With Octopus Cloud and tenanted deployments, Guestline automated updates to over 800 hotel customers, saving thousands of hours and significantly improving consistency and speed. The team now delivers updates twice a month, enhancing customer experience and enabling faster cloud adoption across its global footprint.
-
Recruit Wizard scaled and moved to daily deployments with Octopus Cloud
Recruit Wizard transformed its software delivery by adopting Octopus Deploy for full deployment automation across Kubernetes and virtual machines. Moving from quarterly to daily deployments, the team now uses Config as Code and Runbooks to streamline releases, reduce errors, and empower non-engineering staff to run operational tasks independently. With Octopus Cloud, they’ve modernized and scaled their deployments while staying focused on growth and innovation in recruitment software.
-
Five Reasons Standalone Vulnerability Scanning Isn’t Enough in 2025
Vulnerability scanning alone doesn’t cut it anymore. While it’s long been a core security practice, scanning tools can’t tell you which vulnerabilities are exploitable, how attackers would target them, or which ones pose real risk. This article explores the limitations of vulnerability scanning, the shortfalls of traditional vulnerability management, and why organizations must adopt a risk-based, context-driven approach to application security. Learn how to prioritize based on exploitability, integrate security across the SDLC, and move toward continuous, intelligent threat detection.
