How to Handle Secrets in Helm

How to Handle Secrets in Helm

Learn step-by-step techniques and best practices to handle secrets in Helm charts safely and effectively. Level up your Helm deployments today! ... Read More
The Story of Crush: The Microservice That Navigated the Cloud Native O... Mattias Gees & Tom Meadows

Getting Started With SPIFFE For Multi-Cloud Secure Workload Authentication

| | DevSecOps, Tutorials
SPIFFE stands for Secure Production Identity Framework for Everyone, and aims to replace single-factor access credentials with a highly scalable identity solution. This blog post provides some practical applications of SPIFFE in real-world environments ... Read More
Dependency Confusion Vulnerability Exposure Protections In GitGuardian SCA

Dependency Confusion Attacks and Prevention: Register Your Private Package Names

| | supply chain security
Dependency confusion attacks exploit gaps in your software supply chain. Dive into modern dependency management and learn how to defend your systems with best practices ... Read More
Always Be Updating

Always Be Updating

DevSecOps Engineer Gene Gotimer explains why constant software dependency updates are crucial for security in DevSecOps practices ... Read More
Making Sense of Open-Source Vulnerability Databases: NVD, OSV, and more

Making Sense of Open-Source Vulnerability Databases: NVD, OSV, and more

| | DevSecOps, SCA
Essential reading for developers and security professionals alike: a comprehensive comparison of vulnerability databases to help you cut through the noise ... Read More
Securing Containers with Seccomp

Securing Containers with Seccomp

| | DevSecOps, Tutorials
In this article we present a novel way to protect your container applications post-exploitation. This additional protection is called Seccomp-BPF ... Read More
The Runtime Secrets' Security Gap

The Runtime Secrets’ Security Gap

The last mile in secrets security is securing secrets in workloads. Discover a new way to securely deliver encrypted secrets in your infrastructure with innovative open-source tools, and say goodbye to plaintext secrets ... Read More
Managing AWS IAM with Terraform

Managing AWS IAM with Terraform

| | Tutorials
Get started with IAM by using Terraform to create users, groups, and policies ... Read More
Finding leaked credentials in Docker images - How to secure your Docker images

Container Security Scanning: Vulnerabilities, Risks and Tooling

| | DevSecOps
Container security is crucial in the age of microservices and DevOps. Learn about common container vulnerabilities, container security scanning, and popular tools to secure your containers in this comprehensive guide ... Read More
How to Handle Secrets in Jupyter Notebooks

How to Handle Secrets in Jupyter Notebooks

| | Best Practices
From entering passwords with getpass to using secret managers like AWS Secrets Manager, this guide covers best practices for protecting sensitive information in your notebooks ... Read More

Application Security Check Up