Skip to content
Company name
  • Solutions
    • Identity Security Developer​
    • Software Supply Chain Security​
    • Zero Trust Security​
    • Cloud Security​
  • Use Cases
    • Secrets Management ​
    • Secure CI/CD Pipelines​
    • Kubernetes Security​
    • Security Automation​
    • CIAM
  • Products
    • Customer Access
    • Secrets Manager
    • Project Anun​
    • Cloud Privilege Security​
    • Endpoint Privilege Security
  • Community
  • Docs & Resources
  • Developer Blog
  • Solutions
    • Identity Security Developer​
    • Software Supply Chain Security​
    • Zero Trust Security​
    • Cloud Security​
  • Use Cases
    • Secrets Management ​
    • Secure CI/CD Pipelines​
    • Kubernetes Security​
    • Security Automation​
    • CIAM
  • Products
    • Customer Access
    • Secrets Manager
    • Project Anun​
    • Cloud Privilege Security​
    • Endpoint Privilege Security
  • Community
  • Docs & Resources
  • Developer Blog

Author: Shlomo Heigh

Profile picture of Shlomo Heigh
About Shlomo Heigh
Shlomo is a senior software engineer at CyberArk working on Conjur Secrets Manager. He’s an open source and AppSec enthusiast, a member of the CNCF TAG Security and a contributor to multiple OWASP projects. In his free time, you can find him spending time with his wife and daughter, 3D printing, woodworking or hiking.

Posts by Shlomo Heigh

Enhancing Kubernetes Security and Flexibility with the CyberArk Conjur and ESO Integration

Posted on August 28, 2024

In today’s fast-paced world of DevOps and cloud-native applications, managing secrets securely is critical. CyberArk Conjur, a trusted solution for…

Posted in Uncategorized

Security Best Practices for Cloud-native Development: A Review of Cloud Native Computing Foundation Resources

Posted on April 6, 2023 (May 18, 2023)

When people hear the words “open-source project,” the image that often springs to mind is a very technical group of…

Posted in Cloud-Native, Developers, Security

Environment Variables Don’t Keep Secrets: Best Practices for Plugging Application Credential Leaks

Posted on January 25, 2023 (January 30, 2023)

Applications need secrets to connect to other machines and services – API keys, SSH keys, session tokens, database connection strings…the…

Posted in Kubernetes, Secrets Manager
  • Solutions
    • Identity Security Developer​
    • Software Supply Chain Security​
    • Zero Trust Security​
    • Cloud Security​
  • Uses Cases
    • Secrets Management ​
    • Secure CI/CD Pipelines​
    • Kubernetes Security​
    • Security Automation​
    • CIAM
  • Developer Community​
    • Developer Security Blog​
    • Developer Newsletter
    • Developer Community Forum​
    • Open-source Projects​
  • Resources
    • Tutorials
    • Docs​
    • YouTube​

Copyright © 2025 CyberArk Software Ltd. All rights reserved. Terms and Conditions | Privacy Policy |