151 results

Explore the Best of Drupal 10

Drupal core’s front end was last revamped in Drupal 8 with the introduction of the Twig templating system, but unlike other parts of the core, it has since largely remained stagnant… until recently (dun dun dun)! 

In this article, I'm going to tell you about my favorite things coming soon to the front end of Drupal 10 core ordered roughly by their use case. Many of these features will be in December’s 10.0.0 release on Dec. 14, but some will come in later releases.

Migrating From Drupal 7: One-Click Migration — Is That Possible? Backdrop CMS + Drupal 9.

table { line-height: 1.15; width: 100%; } table, th, td { border: 1px solid; border-collapse: collapse; padding: 1em; }

Editor's note: This post was co-written by Irina Zaks, Co-Founder and Chief Technology Officer at Fibonacci Web Studio, and Tori Sparkman Lewis, Director of Projects at Fibonacci Web Studio in 2022 when Drupal 9 was the newest version of Drupal. The content was updated in lightly 2024 but has not been re

How the 2010s Blew Up the Monolithic Website into Decoupled Architectures

Early in my career as a developer working with educational institutions, media organizations and other large companies, I could see that I stood on a figurative battlefield.

IT departments had fought a war with their marketing or communications counterparts over who truly owned the website. IT departments had incentives to slow down changes to prioritize stability and security. Marketing professionals had incentives to chase faster changes. That often meant giving more people access to more layers of the stack. 

How to Fight Cyberattacks with Pantheon's Security Tools

Learn how one company managed to mitigate malicious attacks with Pantheon’s security tools.

It was an early morning in October when a sysadmin woke up to some odd behavior on the sites he manages. He noticed some websites were incredibly slow while others were receiving more than 15 times their usual traffic. The sysadmin quickly suspected a cyberattack might be underway. He was correct, but what he didn’t know was that he’d be fighting this sophisticated attack for months to come. 

Threat Modeling is Table Stakes for Security

Table-stakes security often means a checklist to get the security team off the back of the web team. This approach is weak from every perspective: a frustrating web and security collaboration process, vulnerability to excessive spending with security vendors and loose credential hygiene. A holistic threat modeling approach — centering collaboration and effectiveness — can redefine table stakes to everyone’s benefit.

Here are four common approaches followed by tips to center threat modeling.

Subscribe to Developer