Adopt WebOps to Avoid Initialism Overload

Ok, it's been a few years of explaining “Why ‘WebOps.’" We at Pantheon think WebOps is the word that clarifies the changes needed to make websites and web teams more successful. One slide in particular has become my go to tool for highlighting the painful breakdowns in communication that happen when chasing problems on a site.

Building Blazing Fast Decoupled Sites with Easytech Green

Lucas Mingarro, Co-Founder & CEO of Easytech Green, filled us in on an exciting new project with one of the only two liberal arts colleges in Argentina, Universidad de San Andrés. A Pantheon partner since 2016, Easytech Green relaunched the university’s flagship website delivering an accessible, mobile-first user experience using our new Front-End Sites product.

A Practical Guide to Improving Your SEO Strategy in 2023

Digital marketing is a dynamic industry that shows no signs of declining. In 2022, Google rolled out numerous updates that lowered page rankings, demoted unhelpful content and relegated websites with spammy links to the latter pages in search.

DDoS Attacks, Pantheon and You

Since the first documented DoS-style attack in 2000, DDoS attacks continue to flourish. In fact, during the Tokyo 2020 Summer Olympics, the Federal Bureau of Investigation (FBI) issued a notification warning entities to be on alert for DDoS attacks.

Explore the Best of Drupal 10

Learn about 10 new features in Drupal 10's theme layer that level up the developer experience.

Pantheon is DAM-agnostic. Go on, Give your Site a DAM

Your CMS, digital asset management software (or DAM) and Pantheon’s website operations platform can be friends. That’s what I say to anyone who worries if their file and workflow management will integrate nicely into Pantheon. And yet, questions persist because DAMs are like mega-homes for media assets and we know real estate deals can be messy. 

Decoupled Architectures: Cutting-Edge Contradictions in the 2020s

The best practices of web development always move. As soon as a best practice seems solid for one team or one role, the conditions and pressures that led to the best practice's rise will change again. And then the best practice doesn't make much sense any more. Those pressures often push in different, sometimes directly opposing directions. That's why for the remainder of the 2020s, those working on the figurative bleeding edge of website operations will resolve seemingly contradictory needs to make their tools:

Threat Modeling is Table Stakes for Security

Table-stakes security often means a checklist to get the security team off the back of the web team. This approach is weak from every perspective: a frustrating web and security collaboration process, vulnerability to excessive spending with security vendors and loose credential hygiene. A holistic threat modeling approach — centering collaboration and effectiveness — can redefine table stakes to everyone’s benefit. Here are four common approaches followed by tips to center threat modeling.