Skip to content
_CORE
AI & Agentic Systems Core Information Systems Cloud & Platform Engineering Data Platform & Integration Security & Compliance QA, Testing & Observability IoT, Automation & Robotics Mobile & Digital Banking & Finance Insurance Public Administration Defense & Security Healthcare Energy & Utilities Telco & Media Manufacturing Logistics & E-commerce Retail & Loyalty
References Technologies Blog Know-how Tools
About Collaboration Careers
CS EN DE
Let's talk
Home / Blog
CORE BLOG

Technology, Architecture, AI, DevOps & Security

Practical articles from real projects. From enterprise architecture to AI agents — we share what works in production.

510
Articles
8
Categories
15
Years of experience
Showing 20 of 510 articles
AI in Penetration Testing — Automated Vulnerability Scanning
05. 01. 2026ai

AI in Penetration Testing — Automated Vulnerability Scanning

Overview of AI-powered penetration testing tools in 2026: Pentera, NodeZero, XBOW, Burp Suite and more. How...

SBOM and Software Supply Chain Security — Protecting the Supply Chain
02. 01. 2026ai

SBOM and Software Supply Chain Security — Protecting the Supply Chain

Software supply chain security in 2026: SBOM, SLSA framework, dependency management and how to protect against...

Zero Trust for Enterprises — Implementation Guide
01. 01. 2026development

Zero Trust for Enterprises — Implementation Guide

A practical guide to implementing Zero Trust Architecture for enterprises. Law 264/2025, NÚKIB, NIS2, concrete steps...

Confidential Computing — Confidential Computations in the Cloud
31. 12. 2025ai

Confidential Computing — Confidential Computations in the Cloud

Confidential Computing in 2026: TEE enclaves, encrypted memory, multi-party computation and practical deployment in...

Digital Twin in Practice — From Prototype to Production
30. 12. 2025ai

Digital Twin in Practice — From Prototype to Production

How to build digital twin: data model, real-time synchronization, simulation. Azure Digital Twins, AWS IoT TwinMaker...

Zero Trust per NIST 800-207 — 12-Month Implementation Roadmap
29. 12. 2025development

Zero Trust per NIST 800-207 — 12-Month Implementation Roadmap

A practical guide to implementing Zero Trust Architecture following NIST 800-207. Identity-centric security,...

Service Mesh — Istio, Cilium and the Future of the Network Layer
25. 12. 2025infrastructure

Service Mesh — Istio, Cilium and the Future of the Network Layer

A complete guide to service mesh technologies in 2026. Istio vs Cilium Service Mesh vs Linkerd comparison, sidecar...

AI Agents in Production: 5 Lessons from the Banking Sector
24. 12. 2025ai

AI Agents in Production: 5 Lessons from the Banking Sector

Practical experience deploying AI agents in a regulated environment. What works, what doesn't, and what to watch out for.

Web Components in 2026 — The Standard That Finally Matured
23. 12. 2025ai

Web Components in 2026 — The Standard That Finally Matured

Web Components for enterprise design systems. Shadow DOM, Custom Elements, Lit, Shoelace. Framework-agnostic...

Zero Trust Architecture in Practice — Complete Guide 2026
22. 12. 2025security

Zero Trust Architecture in Practice — Complete Guide 2026

Zero Trust Architecture in practice (2026): NIST SP 800-207, reference architecture, step-by-step implementation...

Zero Trust in Practice — BeyondCorp, ZTNA & Microsegmentation
20. 12. 2025development

Zero Trust in Practice — BeyondCorp, ZTNA & Microsegmentation

Zero Trust Architecture in practice 2026: never trust always verify principles, identity-centric security,...

WebAssembly in the Enterprise Backend 2026 — From Edge to Core Systems
19. 12. 2025ai

WebAssembly in the Enterprise Backend 2026 — From Edge to Core Systems

A complete guide to deploying WebAssembly (Wasm) in the enterprise backend 2026. WASI 0.2, component model, Spin,...

Deno 2 for Enterprise — Secure Runtime and JSR Ecosystem
17. 12. 2025development

Deno 2 for Enterprise — Secure Runtime and JSR Ecosystem

Deno 2 in the enterprise: a security-first approach, Node.js compatibility, JSR registry, the Fresh framework and...

Zero Trust in Practice: How We Secured Banking Infrastructure
16. 12. 2025security

Zero Trust in Practice: How We Secured Banking Infrastructure

Practical implementation of Zero Trust architecture in banking. Micro-segmentation, mTLS, service mesh,...

Vector Databases: Pinecone vs Weaviate vs Qdrant vs pgvector
15. 12. 2025data

Vector Databases: Pinecone vs Weaviate vs Qdrant vs pgvector

A complete comparison of four vector databases — performance benchmarks, pricing models, index architecture, HNSW vs...

Secrets Management — HashiCorp Vault, SOPS & Secure Secrets
13. 12. 2025security

Secrets Management — HashiCorp Vault, SOPS & Secure Secrets

Complete guide to secrets management in 2026. HashiCorp Vault, Mozilla SOPS, External Secrets Operator, key rotation...

Sovereign Cloud — European Data Sovereignty in 2026
12. 12. 2025ai

Sovereign Cloud — European Data Sovereignty in 2026

Sovereign Cloud and European data sovereignty: EUCS certification, Gaia-X, Czech cloud alternatives and practical...

Zero Trust Architecture in 2026 — Why the Perimeter Is Not Enough
11. 12. 2025security

Zero Trust Architecture in 2026 — Why the Perimeter Is Not Enough

A complete guide to Zero Trust Architecture in 2026. 5 principles, step-by-step implementation, tools, and a case...

Ephemeral Environments — Preview Environment for Every PR
10. 12. 2025ai

Ephemeral Environments — Preview Environment for Every PR

Automatic preview environments for pull requests. Kubernetes namespaces, Docker Compose, Vercel Preview. Costs,...

Sovereign Cloud — Why European Companies Move Data Home
07. 12. 2025ai

Sovereign Cloud — Why European Companies Move Data Home

61% of European CIOs want to increase use of local cloud providers. AWS launched European Sovereign Cloud, the EU is...