Cisco Tech Blog

Learn about the latest tech innovations and engage in thought leadership news from Cisco.

Taming of the QueueUnified Software Tracing is Unified, Binary, Streaming, and Highly Scalable How Session-Aware Networking Can Massively Scale Authentication and Access Policy ControlSetup AQUA (Advanced Query Accelerator) for Amazon RedshiftDoes your observability stack up?Celebrating Video Game Day Progressive Delivery Solution for Cisco CalistiDesign Insights - How Cisco is Pushing the Boundaries of Customer ExperienceTackle API Security with the CVSS Vulnerability Scoring SystemHow Panoptica Secures GitOps to Protect CI/CD Pipeline ToolsSeeing the Unseen: Gaining Visibility into API Payload Encryption5 Reasons DevOps Should Integrate Apache Airflow & Great ExpectationsCode Integrity Risks: The Overlooked Wrinkle in Serverless SecurityTell your SD-WAN about your Service Mesh External Services!The Ultimate Cloud Native Security FAQThe Ultimate Cloud Native Security GlossaryWhy Data Models Rule the Enterprise Network WorldOptimize Your Data Pipeline with Apache Airflow and Great ExpectationsWhy Network App Hosting is Taking Off in Enterprise CompaniesFacelift Kurun for Kubernetes Event TunnelingOpenTelemetry and Epsagon - a Love Story in Three ActsHow to Implement Circuit Breaker PatternsThe Top Cloud Native Security Conferences to Attend in 2022Get More Out of Your Kubernetes EventsGetting Started with AWS Lambda in .NETIssue Management and Error TrackingCisco ET&I & Cloud Native Security - Pushing boundaries & making bold betsUsing Deployment Markers to Enhance ObservabilityIntroduction to Synthetic MonitoringThe Importance of Application and Infrastructure-Level Dashboards in Cloud EnvironmentsProtected: Getting Started with AWS Lambda and RubyTroubleshooting Using Prometheus Metrics in EpsagonAutoscaling Kinesis Data Streams in EpsagonMaking the Most Out of OpenTelemetryEverything DevOps need to know about the NSA’s Kubernetes Security GuidanceApache Kafka and Bytecode InjectionLeveraging Gitops to Deploy Cloud Native SecurityThe 3 Pillars of API Security: Visibility, Risk Scoring & EnforcementAutomate Multi-Cluster Metrics with Cisco MCOMInternal vs. External API Security: What to KnowShould you run Apache Kafka on Kubernetes?SPIFFE/SPIRE Federation on Kind clustersAPI SecurityWhat’s New in Kubernetes v1.21  and Istio 1.9  Releases and their implications on DevOps?The dark side of Kubernetes admission webhooksDrowning in Data and Starving for Insights - Episode #3: Application of Topological Data Analysis to TelemetryAI 2.0 - Episode #1, IntroductionWhat in the world of Applications?ScaleX Under Armour Invisible MigrationsDrowning in Data and Starving for Insights - Episode #1: Swimming in Sensors and Drowning in DataIntroducing Media Streaming MeshWhat's new in Istio 1.9, a quick walkthroughIntroduction to application health monitoringKubernetes API Security - The Challenges & Best PracticesNext generation integrated servicesRED Alerts: a practical guide for alerting in production systemsQuantum Networking — A Cisco StrategyKafka external accessOne Eye Release 0.4 UpdatesWhat's new in Istio 1.8, a quick walkthroughAnnouncing Backyards 1.5Managing ksqlDB with SupertubesRequest rate monitoringWarm Up Logs from Cold StorageIstio configuration validation with BackyardsTap into Kubernetes logs with the Logging OperatorReliable hybrid infrastructure with Backyards and SupertubesDefining application level SLOs using BackyardsBurn rate based alerting demystifiedIstio and Kubernetes ft. OPA policiesBulletproof Kafka, and the tale of an Amazon outageWhat has Kubernetes ever done for us?Safe and sound canary upgrade for your Istio control planeGPU accelerated AI workloads on KubernetesHTTP proxies in the cloud native worldWhat's new in Istio 1.7, a quick walkthroughTracking and enforcing SLOsOne Eye release updatesHardened FIPS compliant Istio with BackyardsTry Pipeline Enterprise for freeKafka Schema Registry on Kubernetes the declarativeIstio ingress controller as an API gatewayManage your AWS GovCloud Kubernetes clusters with PipelineCertificate management on IstioProxy WebSocket through Kubernetes API serverHelm 3, the Good, the Bad and the UglyKubei: A Kubernetes Runtime Vulnerabilities Scanner