How to Handle Secrets in Helm

How to Handle Secrets in Helm

Learn step-by-step techniques and best practices to handle secrets in Helm charts safely and effectively. Level up your Helm deployments today! ...
The Story of Crush: The Microservice That Navigated the Cloud Native O... Mattias Gees & Tom Meadows

Getting Started With SPIFFE For Multi-Cloud Secure Workload Authentication

| | DevSecOps, Tutorials
SPIFFE stands for Secure Production Identity Framework for Everyone, and aims to replace single-factor access credentials with a highly scalable identity solution. This blog post provides some practical applications of SPIFFE in ...
Securing Containers with Seccomp

Securing Containers with Seccomp

| | DevSecOps, Tutorials
In this article we present a novel way to protect your container applications post-exploitation. This additional protection is called Seccomp-BPF ...
Managing AWS IAM with Terraform

Managing AWS IAM with Terraform

| | Tutorials
Get started with IAM by using Terraform to create users, groups, and policies ...
Streamlining CLI Authentication: Implementing OAuth Login in Python

Streamlining CLI Authentication: Implementing OAuth Login in Python

| | Engineering, Tutorials
When building an application that requires user authentication, implementing a secure login flow is critical. In this article, we'll walk through how we created a robust OAuth login flow for ggshield, our ...
Activating end-to-end secrets security with CyberArk and GitGuardian

Activating end-to-end secrets security with CyberArk and GitGuardian

In this guide, we'll walk you through integrating CyberArk Conjur with GitGuardian, step by step ...
Pulumi VS Terraform: The Definitive Guide to Choosing Your IaC Tool

Pulumi VS Terraform: The Definitive Guide to Choosing Your IaC Tool

In this blog, we do a deep dive into Pulumi V.S. Terraform (and slightly touch the mechanism of AWS CDK/CDK for Terraform, for that matter) ...
Ethical Hacking Q&A

Ethical Hacking Q&A with Sonya Moisset

| | Tutorials
Join Mackenzie Jackson and Sonya Moisset for an eye-opening discussion about Ethical Hacking as Sonya answers questions from Mack and the webinar audience ...
Hands-on guide to Runtime Security for CI/CD Pipelines with StepSecurity

Webinar Recap: Hands-on guide to Runtime Security for CI/CD Pipelines with StepSecurity

A condensed recap of our hands-on runtime security webinar from September. Get the juiciest knowledge nuggets and pointers to more ...

Application Security Check Up