Latest Stories

Learn about the differences between infrastructure provisioning, configuration orchestration and configuration management and how they relate to IaC.

Doug Barney

Exciting News! Chef InSpec 6 is here, bringing faster compliance and flexible licensing options. At Progress Chef, we're committed to innovation and customer empowerment. Discover what's new in Chef InSpec 6 and how it benefits you.

Prashanth Nanjundappa

Technical blog on how to access License Key with different tiers.

Akshay Parvatikar

Explore the key security myths that DevOps teams should be aware of. Discover why misconfigurations, insider threats, cloud security posture management, IoT device security, and password problems are critical aspects of modern security that every DevOps professional should understand.

Doug Barney

This blog post provides an overview of vulnerabilities discovered in Chef and Progress Chef’s approach and recommendation to fix them with links to technical documents.

Brian Loomis

This blog provides awareness and guidance about the importance of SDLC/Chef coding best practices.

Brian Loomis

The Chief Information Security Officer (CISO) role has become essential for organizations, with predictions of a 75% growth in the cybersecurity workforce and a 0% unemployment rate in the field. CISOs face significant stress and burnout, with concerns about personal liability and unreasonable job expectations. To address the talent shortage, organizations should partner with vendors, leverage automation, upskill existing employees, diversify their workforce, and promote a strong security culture. The broader cybersecurity workforce has 3.5 million jobs, with underrepresentation in gender and ethnicity, emphasizing the need for creative solutions to meet cybersecurity needs.

Mark Troester

This blog explains how you can apply the different features of Chef InSpec to ensure that security and compliance standards are enforced consistently in every environment.

Shua Matin

This blog discusses the importance of Zero Trust and DevOps in strengthening cybersecurity in today's complex environments, highlighting the need for continuous verification, monitoring, and access control to protect against evolving cyber threats.

Doug Barney Rick Brown Jacob George