If you are reading this, you probably got sucked into watching Game of Thrones when it first aired on HBO…
Category: Secrets
Technical Deep Dive: Using Conjur Secrets in VM-Deployed Ansible Tower Applications
Secrets management assists organizations in authenticating applications and checking clients before allowing them to access sensitive information, systems, and services….
Security Automation with Red Hat Ansible Tower Introduction
No matter their occupation, nobody likes to do the same set of tasks repetitively — especially when automation is an…
Retrieving Conjur Secrets in a Spring MVC Kubernetes Application
Many organizations are now deploying their containerized applications in Kubernetes clusters to achieve highly available, automatically orchestrated solutions. Often, however,…
Using Conjur REST OpenAPI to Simplify Secure Software Development
The Conjur OpenAPI is a language agnostic API description standard that allows for both human and machine users to investigate…
Conjur Secrets Management in Knative Serverless Functions
Knative is the de facto standard for running serverless workloads in Kubernetes. But what do you do when your Knative…
Using CyberArk Conjur with Azure Serverless Functions and Managed Identities
Businesses need to provide flexible access to services that scale efficiently while always protecting customer data. Technologies like microservices and…
Tutorial: Kubernetes Vulnerability Scanning & Testing With Open Source
Mainstream technology enterprises widely use Kubernetes. It’s an extendable, lightweight, open-source container orchestration platform. This popular platform has an ever-expanding…
Technical Deep Dive: Centralized Secrets Management for Multi-cloud with Infrastructure as Code
In today’s world of cloud environments, deployments often use infrastructure as code (IaC). IaC deployments use a domain-specific language (DSL)…
Remove Secrets from your Codebase
With technology becoming a central part of our daily lives, we need to keep information safe from an equally rapidly…
Three Steps to Avoiding the Secret Zero Trap
Most secrets management solutions rely on a master key or “secret zero” that can unlock other credentials. The problem is…
Managing Testing Secrets in Jenkins Pipelines
In the first and second articles of this series, we discussed managing the information needed to build and test applications….
Keeping Secrets Secure on Kubernetes
Handling secrets in cloud-native environments is a challenge for many organizations. Virtually any application requires some sort of secret, such…
Why You Need Secrets Management in Your Jenkins Pipeline
Jenkins is a versatile platform for implementing continuous integration and continuous delivery (CI/CD) processes to develop applications. Using plugins, Jenkins…
Secret Zero: Eliminating the Ultimate Secret
Centralized secrets management addresses important DevOps security attack vectors such as secret sprawl and security islands, but it could help introduce…
Secrets Management Considerations for a Post-Quantum World
How will quantum computing change secrets management? That seems like a pertinent question to ask, now that Google has claimed…
Understanding Secrets Management, OAuth, and Single Sign-On (SSO)
Once upon a time, access management was a simple thing. It focused mostly on making sure that the right users…
Secrets Management Overview For Developers & DevOps
Secrets management is a critical problem for developers, especially for teams adopting DevOps practices. Until recently, it was the IT…
Secrets Management Best Practices for Machines and Services to Get Secure Access
When we talk about Secrets Management and handling secrets, we ought to think about all the users of the system…
Developer’s Guide to Selecting a Secrets Management Solution
The role of the developer has changed a great deal in recent years. Application architectures now include microservices, distributed systems,…
How to Scan GitHub Repositories for Secrets & Credentials with Open Source
Some GitHub repositories don’t just contain code – they contain passwords, API tokens, and credentials. The worst part? These are…
Tutorial: How I Secured Third-party Mongo API Secrets in My Node.js App Across the Cloud
Developing modern web applications in the cloud nowadays is more streamlined than ever. This is true because many external vendors…
An Introduction to Creating & Organizing Your First Public Key Store for Microservices With Secrets Management
Microservices are taking the world by storm, and the movement isn’t showing signs of slowing down any time soon. The…
Building a Comprehensive Monitoring Strategy That Includes Secrets Management
Over the past decade, software development and information technology operations have become more integrated, spawning a new approach, commonly called…
Four Ways to Keep Kubernetes’ Secrets Secret
We have talked a lot about the speed at which DevOps innovation has moved and how security has consistently struggled…
Managing Secrets in Red Hat Ansible Automation Playbooks
Ansible is an agentless management tool that can manage provisioning, configuration, and deployment of applications. RedHat acquired Ansible in 2015…
How to Give Developers Access Without Giving Away Too Much Control
When you are developing an application, there are some important things that should not fall into the hands of strangers….
Setting up SSH Key management for multiple servers with Conjur
The SSH or Secure Shell protocol has become the industry standard for logging into one computer from another. Engineers use…
Getting off The Jenkins Island
CyberArk was happy to be a part of Jenkins World, aka DevOps World, which took place this year in San…
How To Secure Secrets Within Your Java Application With an Open Source Secrets Management SDK
Over the past decade, my career has evolved from Development to DevOps and most recently to DevSecOps. DevSecOps is the result of organizations…
Mitigating Risk in the Cloud with Authorization of Amazon Web Services Apps
In this article, we’re going to talk about the problems surrounding authorization for your AWS account. We’ll define what those…
KubeCon 2019: The Conference for the Sagrada Familia of Software
Introduction KubeCon is the premiere conference for the Kubernetes and cloud-native communities. Every year it is held jointly with CloudNativeCon,…
Using Conjur with Terraform
What is Terraform? Terraform is a tool for managing infrastructure as code. You define your architecture and software setup once,…
Managing and Understanding the Secrets of IoT
The Internet of Things, or IoT, is what allows us to take the power of computing beyond desktops, servers, and…
Loading Your Database Credentials at Runtime with Conjur
Back when I first became a programmer, it was a common practice to include database credentials right in the code…
Conjur Open Source Now Natively Integrates with Terraform
This integration allows Terraform users to leverage Conjur’s advanced non-human access control capabilities such as robust secrets management, tamper resistant…
To Key or Not to Key: That is the Question
Over the past few years, whether you’re a developer, a system administrator, or a security professional, your world has changed a…
CyberArk CNCF KubeCon 2018 Wrap up
I was really excited to attend the Cloud Native Computing Foundation’s (CNCF) KubeCon + CloudNativeCon Kubernetes conference in Seattle. I…
Syncing the Enterprise On-premises World of Security With DevOps
If your organization has been successful since before containers were a thing, then you probably already have a mix of…
Introducing the Secretless Broker Open Source Beta
CyberArk is incredibly pleased to announce the beta release of a new open source project, Secretless Broker. Secretless Broker makes…
“One-Click” K8s Authentication & Secrets Management on GCP
CyberArk Conjur Open Source is now available as a Kubernetes application in the Google Cloud Platform (GCP) Marketplace. The new…
Using Summon to Manage Secrets as You Move From Dev to Prod
I’ve recently been working with secrets.yml files that point to different secrets for different environments, and I wanted to share…
Don’t Get Pwned by Secret Zero
The Secret Zero Problem I have talked to a number of security conscious professionals across a wide range of…
Why are so many companies getting hacked lately, and what can be done about it?
If you think you’re hearing about a company getting hacked almost every day, that’s because you’re correct: there were over…