DevOps | Security
Key Ownership in the Cloud: Using Zero Knowledge to Protect Your DataCustomers often wonder if their data is secure in the cloud. To answer this, let's discuss key ownership and zero trust.
DevOps | Security
Key Ownership in the Cloud: Using Zero Knowledge to Protect Your DataCustomers often wonder if their data is secure in the cloud. To answer this, let's discuss key ownership and zero trust.
News
Akeyless $65M Round B: Reimagining Secrets ManagementWe’re excited to announce that we have raised a Series B round of $65 million! The funding round was led by NGP Capital with the participation of our existing investors Team8 Capital and Jerusalem Venture Partners (JVP).
DevOps | Security
Why Secrets Rotation for On-Prem Infrastructure MattersCredential rotation isn’t always simple or easy. Enter Universal Identity, a lightweight authentication method you can implement on any operating system.
DevOps
Using External Secrets Operator with Akeyless Secrets OrchestrationLearn about the External Secrets Operator for Kubernetes open source project, and how you can use it with Akeyless secrets.
Product Updates
Now Available: Securing Rancher Cluster Secrets With AkeylessIn our effort to enable our users to manage and secure secrets across any tool and environment, we recently added the ability for Rancher Kubernetes Engine (RKE) clusters to authenticate directly with Akeyless. In this post, we will go through why this is important, how this makes your life easier, and walk you through the […]
Security
3 Things To Look Out For When Using Cloud VaultsCloud Service Providers (CSPs) such as Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP) have enabled the widespread move of organizations to the cloud. Using workloads in the cloud accelerates an organization’s key initiatives such as mobility, collaboration tools, scale-out apps, and business continuity. These workloads need to communicate with other workloads, or […]
Security
Secure Your Kubernetes with Akeyless Secrets OrchestrationExplore the Akeyless Kubernetes plug-in and how you can use it to achieve enterprise-level security for Kubernetes secrets.
Security
How Do Just-In-Time Secrets Help Secure Software Supply Chains?The landscape of cybersecurity is continuously evolving. In this digital age where data is the new gold, the quest for secure privileged access is paramount. The dawn of static secrets, including credentials, certificates, and keys, has given rise to an innovative solution – Just-in-Time (JIT) Secrets Management. This approach has emerged as a game-changer in […]
Security
Combating Insider Threats from the Inside OutInsider threats are one of the most difficult risks for security teams to manage because most employees require some level of trust and privileges to perform their roles. Managing this risk involves detecting and containing the undesirable behavior of trusted accounts in the organization. This undesirable behavior often goes undetected for a long time. Insider […]
Security
The Secret to Securing your Software Supply ChainA software supply chain attack is a cyber attack where less secure elements in the chain such as third-party networks or code repositories are compromised by attackers as a means to embed hidden malware, which then finds its way into the infrastructures of organizations that use the final software. In these attacks, attackers try to […]
Security
Extra Security for Kubernetes Secrets with AkeylessKubernetes is a popular open source tool for automating application development. While Kubernetes includes a basic solution for keeping secrets (passwords, tokens, or keys), most organizations need an extra layer of management and security to streamline development and protect against leaks. Let’s take a deeper look at what Kubernetes provides and how you can easily […]
Security
DevSec For Scale Podcast Ep 7: Proactively Building Secure SoftwareSecurity is often an afterthought when it comes to designing and developing applications. Josh Grossman, CTO at Bounce Security and OWASP Israel Board member, talked to me about practical ways to build security into applications and the software development lifecycle. In this interview, we talk about OWASP and the open resources it provides for software […]