DevOps | Security
Why Secrets Rotation for On-Prem Infrastructure MattersCredential rotation isn’t always simple or easy. Enter Universal Identity, a lightweight authentication method you can implement on any operating system.
DevOps | Security
Why Secrets Rotation for On-Prem Infrastructure MattersCredential rotation isn’t always simple or easy. Enter Universal Identity, a lightweight authentication method you can implement on any operating system.
Security
3 Things To Look Out For When Using Cloud VaultsCloud Service Providers (CSPs) such as Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP) have enabled the widespread move of organizations to the cloud. Using workloads in the cloud accelerates an organization’s key initiatives such as mobility, collaboration tools, scale-out apps, and business continuity. These workloads need to communicate with other workloads, or […]
Security
Secure Your Kubernetes with Akeyless Secrets OrchestrationExplore the Akeyless Kubernetes plug-in and how you can use it to achieve enterprise-level security for Kubernetes secrets.
Security
How Do Just-In-Time Secrets Help Secure Software Supply Chains?The landscape of cybersecurity is continuously evolving. In this digital age where data is the new gold, the quest for secure privileged access is paramount. The dawn of static secrets, including credentials, certificates, and keys, has given rise to an innovative solution – Just-in-Time (JIT) Secrets Management. This approach has emerged as a game-changer in […]
Security
Combating Insider Threats from the Inside OutInsider threats are one of the most difficult risks for security teams to manage because most employees require some level of trust and privileges to perform their roles. Managing this risk involves detecting and containing the undesirable behavior of trusted accounts in the organization. This undesirable behavior often goes undetected for a long time. Insider […]
Security
The Secret to Securing your Software Supply ChainA software supply chain attack is a cyber attack where less secure elements in the chain such as third-party networks or code repositories are compromised by attackers as a means to embed hidden malware, which then finds its way into the infrastructures of organizations that use the final software. In these attacks, attackers try to […]
Security
Extra Security for Kubernetes Secrets with AkeylessKubernetes is a popular open source tool for automating application development. While Kubernetes includes a basic solution for keeping secrets (passwords, tokens, or keys), most organizations need an extra layer of management and security to streamline development and protect against leaks. Let’s take a deeper look at what Kubernetes provides and how you can easily […]
Security
DevSec For Scale Podcast Ep 7: Proactively Building Secure SoftwareSecurity is often an afterthought when it comes to designing and developing applications. Josh Grossman, CTO at Bounce Security and OWASP Israel Board member, talked to me about practical ways to build security into applications and the software development lifecycle. In this interview, we talk about OWASP and the open resources it provides for software […]
Security
DevSec for Scale Podcast Ep 6: Policy-as-CodePolicy-as-code is a relatively new methodology of managing and automating security policies through code. Eran Bibi, co-founder and CPO of Firefly and former R&D Director of Aqua Security, talked with me about how DevOps engineers can harness the power of policy-as-code to validate and secure their cloud deployments. In this interview, we talk about how […]
Security
Detect Risky Behavior with Akeyless & DatadogExpand your Akeyless monitoring activities by automatically forwarding your Akeyless logs to Datadog for ongoing alerts of outlying behaviors. Learn how in this blog post.
Security
DevSec For Scale Podcast Ep 5: Cloud Security for StartupsStartups have a different makeup than large organizations. Their DNA is just different as they are more lean and agile. This offers startup developers the ability to shift their security as far left as possible and make the right moves from the beginning to secure their infrastructure and applications. However, not all startups have a […]
Security
Disrupting the Kill Chain with Just-in-Time AccessAdversaries have many devious ways to get access to an organization’s data, for different reasons, including data theft or ransom. Many of their actions can be categorized in different steps as part of a concept known in cyber security as a kill chain. Meanwhile, security teams are looking for ways to break this chain, and […]