Honeypots and Honeytokens: Trapping Attackers With Source Code Lures
Many developers were left wondering which secrets were compromised and what code needed to be updated after attackers breached CircleCI…
Many developers were left wondering which secrets were compromised and what code needed to be updated after attackers breached CircleCI…
The bots are here…and they can code! AI tools like ChatGPT from OpenAI have burst onto the market and have…
Sold. Out. For the first time ever, KubeCon Europe 2023 was sold out (in a venue that can hold about…
If you are reading this, you probably got sucked into watching Game of Thrones when it first aired on HBO…
For DevSecOps, there’s always a balancing act between the fast pace of development velocity and security. Developers want to move…
Kubernetes has come a long way since its inception. But as the adoption of containerization has grown, Kubernetes security continues…
No matter their occupation, nobody likes to do the same set of tasks repetitively — especially when automation is an…
Red Hat OpenShift is a Kubernetes-based platform for container orchestration. OpenShift differentiates itself from Kubernetes through features such as tight…
Red Hat OpenShift is one of the most popular and powerful enterprise container orchestration platforms. All container orchestration solutions let…
In recent years, there is a trend toward so-called low-code and no-code platforms. While no-code platforms often appeal to businesses…
Cloud-native applications use resources available to them online, on a public cloud platform, or hosted on-premises. IT teams apply policies…
Most secrets management solutions rely on a master key or “secret zero” that can unlock other credentials. The problem is…
Handling secrets in cloud-native environments is a challenge for many organizations. Virtually any application requires some sort of secret, such…
Jenkins is a versatile platform for implementing continuous integration and continuous delivery (CI/CD) processes to develop applications. Using plugins, Jenkins…
Kubernetes is a popular choice for microservices because it provides scalable, portable, efficient deployment and reduces most DevOps overhead. Generally,…
While you are probably using IAM and CIAM at work and home, you might not know what they are or…
Organizations are migrating and deploying new workloads in cloud environments much more rapidly than ever, instead of expanding traditional on-premises…
Learning is fun, and the best way to learn is through hands-on exercises. That’s why Conjur provides some tutorials to…
Secret management is essential for ensuring an organization’s cybersecurity. In this era, when users share valuable information with service providers,…
Almost every application needs to deal with secrets in one way or another, to authenticate with a backend database or…
Centralized secrets management addresses important DevOps security attack vectors such as secret sprawl and security islands, but it could help introduce…
Container security becomes even more important as container adoption increases the attack surface for nefarious hackers seeking to exploit insecure…
Application Security Overview Good application security (AppSec) prevents unauthorized access and modifications to apps by controlling access to sensitive information…
In many ways, on-call duty and secrets management might seem to occupy pretty different parts of the IT universe. When…
For many organizations, open source software (OSS) has become a must-have tool in their digital transformation toolboxes—what’s more, it’s fundamentally transforming the way software is…
Secrets management is a critical problem for developers, especially for teams adopting DevOps practices. Until recently, it was the IT…
I would like to take a moment to talk about the exciting work our team has done to improve the…
As online communities grow globally, community platforms like Slack and Discourse play a critical role in managing and improving the…
We are thankful to have been a part of the four Kubernetes community filled days – five, including the day…
We have talked a lot about the speed at which DevOps innovation has moved and how security has consistently struggled…
You are reading this on Conjur.org because you love DevOps, open source, Conjur, or maybe it’s the sound of my…
CyberArk was happy to be a part of Jenkins World, aka DevOps World, which took place this year in San…
The Application Developer Access Dilemma As application developers, we need secure access to resources – such as databases, SSH servers,…
Introduction KubeCon is the premiere conference for the Kubernetes and cloud-native communities. Every year it is held jointly with CloudNativeCon,…
Before the dotcom bubble bust in the early 2000’s, “irrational exuberance” drove stock valuations for internet companies that offered free…
This integration allows Terraform users to leverage Conjur’s advanced non-human access control capabilities such as robust secrets management, tamper resistant…
Kubernetes permissions are built with role-based access controls (RBAC), which open up potential risks and need to be carefully controlled. …
I was really excited to attend the Cloud Native Computing Foundation’s (CNCF) KubeCon + CloudNativeCon Kubernetes conference in Seattle. I…
CyberArk is incredibly pleased to announce the beta release of a new open source project, Secretless Broker. Secretless Broker makes…
CyberArk Conjur Open Source is now available as a Kubernetes application in the Google Cloud Platform (GCP) Marketplace. The new…
The Secret Zero Problem I have talked to a number of security conscious professionals across a wide range of…
We are excited to announce the release of a new integration between Conjur and Cloud Foundry (CF). Cloud Foundry users…
Dr. Frankenstein’s monster is one of the most hated and misunderstood monsters of all time. Frankenstein brought his creation…