In today’s fast-paced world of DevOps and cloud-native applications, managing secrets securely is critical. CyberArk Conjur, a trusted solution for…
Category: Uncategorized
A Poisoned Pipeline: Understanding Cyberattacks in the Build Process
Introduction Cyberattacks have become increasingly sophisticated, and attackers are constantly coming up with new methods to gain unauthorized access to…
Honeypots and Honeytokens: Trapping Attackers With Source Code Lures
Many developers were left wondering which secrets were compromised and what code needed to be updated after attackers breached CircleCI…
What Is SLSA? (Supply-chain Levels for Software Artifacts)
In DevOps, securing your software supply chain is paramount, ensuring that your applications are not compromised by malicious actors. That’s…
ChatGPT Is Here: How to Use AI to Write Code and Best Practices for Security
The bots are here…and they can code! AI tools like ChatGPT from OpenAI have burst onto the market and have…
KubeCon 2023: Identity + Security = A Whole New World
Sold. Out. For the first time ever, KubeCon Europe 2023 was sold out (in a venue that can hold about…
The Sword in the Darkness, the Watcher on the Wall
If you are reading this, you probably got sucked into watching Game of Thrones when it first aired on HBO…
Installing Conjur in an EKS Kubernetes Cluster with Helm
Conjur Open Source is a robust secrets management tool to manage, audit, and control access across multiple platforms. Let’s explore…
Using Conjur Secrets in Containerized Ansible Tower Applications
The Ansible Tower integration with CyberArk Conjur allows users and administrators to map sensitive credentials (like passwords, SSH private keys,…
Technical Deep Dive: Using Conjur Secrets in VM-Deployed Ansible Tower Applications
Secrets management assists organizations in authenticating applications and checking clients before allowing them to access sensitive information, systems, and services….
Security Automation with Red Hat Ansible Tower Introduction
No matter their occupation, nobody likes to do the same set of tasks repetitively — especially when automation is an…
Retrieving Conjur Secrets in a Spring MVC Kubernetes Application
Many organizations are now deploying their containerized applications in Kubernetes clusters to achieve highly available, automatically orchestrated solutions. Often, however,…
Using Conjur REST OpenAPI to Simplify Secure Software Development
The Conjur OpenAPI is a language agnostic API description standard that allows for both human and machine users to investigate…
Setting up Conjur on OpenShift
Red Hat OpenShift is a Kubernetes-based platform for container orchestration. OpenShift differentiates itself from Kubernetes through features such as tight…
Installing Conjur in an EKS Kubernetes Cluster Using Rancher
By default, Kubernetes uses Base64 encoding to store information such as application credentials, keys, and certificates. Unfortunately, this Base64 encoding…
Conjur Secrets Management in Knative Serverless Functions
Knative is the de facto standard for running serverless workloads in Kubernetes. But what do you do when your Knative…
Using CyberArk Conjur with Azure Serverless Functions and Managed Identities
Businesses need to provide flexible access to services that scale efficiently while always protecting customer data. Technologies like microservices and…
Low-Code Secrets Management For Beginners
In recent years, there is a trend toward so-called low-code and no-code platforms. While no-code platforms often appeal to businesses…
Technical Deep Dive: Centralized Secrets Management for Multi-cloud with Infrastructure as Code
In today’s world of cloud environments, deployments often use infrastructure as code (IaC). IaC deployments use a domain-specific language (DSL)…
Remove Secrets from your Codebase
With technology becoming a central part of our daily lives, we need to keep information safe from an equally rapidly…
Why Machine Identity is as Important as User Identity to Infrastructure Security
Cloud-native applications use resources available to them online, on a public cloud platform, or hosted on-premises. IT teams apply policies…
Three Steps to Avoiding the Secret Zero Trap
Most secrets management solutions rely on a master key or “secret zero” that can unlock other credentials. The problem is…
Managing Testing Secrets in Jenkins Pipelines
In the first and second articles of this series, we discussed managing the information needed to build and test applications….
Adding Conjur Secrets Management to Your Jenkins Pipeline
The first article in this series discussed the value of integrating Conjur with Jenkins. This article focuses on implementing Conjur…
Keeping Secrets Secure on Kubernetes
Handling secrets in cloud-native environments is a challenge for many organizations. Virtually any application requires some sort of secret, such…
Why You Need Secrets Management in Your Jenkins Pipeline
Jenkins is a versatile platform for implementing continuous integration and continuous delivery (CI/CD) processes to develop applications. Using plugins, Jenkins…
Kubernetes secrets management: Build secure apps faster without secrets
Kubernetes is a popular choice for microservices because it provides scalable, portable, efficient deployment and reduces most DevOps overhead. Generally,…
CIAM vs IAM: What is the Difference
While you are probably using IAM and CIAM at work and home, you might not know what they are or…
Managing Secrets for Cloud Infrastructure Tools Like Terraform
Managing cloud infrastructure isn’t a simple task at the best of times. From initial provisioning and configuration to maintenance and…
Using Java Spring Boot to Administrate Secrets Management Access Policies
Secrets Management Policy Management through Java Spring Boot and Conjur The primary task of a secrets management administrator is to…
Community Perspective: Managing Secrets for Puppet Automation
DevOps teams rely heavily on their CI/CD configuration tools to automate processes, accelerate delivery timelines and innovate at high velocity….
DevOps Security: Cloud Secrets Management, from Multi-Cloud to Cloud Agnostic Environments
Organizations are migrating and deploying new workloads in cloud environments much more rapidly than ever, instead of expanding traditional on-premises…
KubeCon + CloudNativeCon San Diego Wrap up
We are thankful to have been a part of the four Kubernetes community filled days – five, including the day…
Managing Secrets in Red Hat Ansible Automation Playbooks
Ansible is an agentless management tool that can manage provisioning, configuration, and deployment of applications. RedHat acquired Ansible in 2015…
Conjur Open Source is Going Secretless
The Application Developer Access Dilemma As application developers, we need secure access to resources – such as databases, SSH servers,…
Trustless Security in Practice
It’s not an overstatement that in today’s world, it’s dangerous to expose software services to the public without robust security…
Open Source Software isn’t Really Free, but it’s the Future of Business
Before the dotcom bubble bust in the early 2000’s, “irrational exuberance” drove stock valuations for internet companies that offered free…
Using Conjur RBAC with Your Kubernetes Cluster
2015 wasn’t very long ago, but when we look at significant events in computing, that was the year that the…
Using Conjur with Terraform
What is Terraform? Terraform is a tool for managing infrastructure as code. You define your architecture and software setup once,…
Conjur Open Source Now Natively Integrates with Terraform
This integration allows Terraform users to leverage Conjur’s advanced non-human access control capabilities such as robust secrets management, tamper resistant…
Introducing KubiScan
Kubernetes permissions are built with role-based access controls (RBAC), which open up potential risks and need to be carefully controlled. …
On Delivering Quality
I had the pleasure of recently eating dinner at Kitchen Market, a contemporary fusion restaurant in Tel Aviv’s port Namal….
CyberArk CNCF KubeCon 2018 Wrap up
I was really excited to attend the Cloud Native Computing Foundation’s (CNCF) KubeCon + CloudNativeCon Kubernetes conference in Seattle. I…
Special Cases Are a Code Smell
A Warning Sign Los Angeles is famous for its complicated parking signs: Sunny totems of rules and exceptions, and exceptions…
Security Islands
The last decade has been an exciting time for the tech industry, with the advent of collaborative business practices like…
Introducing the Secretless Broker Open Source Beta
CyberArk is incredibly pleased to announce the beta release of a new open source project, Secretless Broker. Secretless Broker makes…
“One-Click” K8s Authentication & Secrets Management on GCP
CyberArk Conjur Open Source is now available as a Kubernetes application in the Google Cloud Platform (GCP) Marketplace. The new…
In Pursuit of Performance
Fast software is satisfying to use, less costly to operate, and responds better to scale. Yet trying to improve the…
Should small software teams use Kubernetes?
Buzz about Kubernetes is everywhere, and plenty of large organizations have adopted it. But what about smaller organizations? Is the…
Making Ruby Yours
Pulling at a loose thread One day I noticed an inconsistency as I was joining together lists of words. Consider…
How we architected the Conjur service to handle infinite traffic
Challenge Conjur is built to allow you to control access to your critical systems. This makes Conjur a critical security…
Kubernetes Authentication with Conjur
One of the biggest challenges in containerized environments like Kubernetes is the secure distribution of credentials and other secrets needed…
Microservices First
Martin Fowler’s popular article on microservices contains this advice: Going directly to a microservices architecture is risky, so consider building…
DevOps Security at Scale
This is the sixth and final blog post in a series discussing how high-performing DevOps teams build secure systems at scale….
Secure your Kubernetes-deployed applications with CyberArk Conjur
In the dynamic world of containers there are challenges around providing secrets needed for a containerized workflow without hurting the…
Every Free Software Community Needs a Code of Conduct
The Conjur team spends a lot of time thinking about security policies. We create them regularly for our own operations…
DevOps Security at Scale
This is the fifth blog post in a series discussing how high-performing DevOps teams build secure systems at scale. If…
Securing Puppet With Conjur
Configuring servers by hand is a costly and error-prone endeavor that increases in difficulty as the number of servers…
Enhancing AWS Secrets Manager with Summon
At their San Francisco Summit today, Amazon released AWS Secrets Manager. It’s a native AWS service that simplifies the…
Understanding Conjur Policy
If this article is the first time you’re hearing about CyberArk Conjur, you’ll probably want to read some of…
Managing Secrets in DevOps: A Maturity Model
How would you assess your team’s current cyber security level within your organization? If you’re like most, your team…
Securing Ansible SSH Keys
Managing the SSH keys Ansible uses to connect to remote machines can be challenging. Placing keys on the Ansible…
DevOps Security at Scale
This is the fourth blog post in a series discussing how high-performing DevOps teams build secure systems at scale….
Cloud Foundry Integration Available in GitHub
We are excited to announce the release of a new integration between Conjur and Cloud Foundry (CF). Cloud Foundry users…
Conjur Store’n’Fetch: 10 minutes to easy secrets management
This is the first blog post in a series focusing on DevOps security workflows with Conjur. Check back for…
Simple Steps to Protect Your DevOps Tools From Crypto Miners
What happened at Tesla? Tesla’s Amazon cloud accounts were breached recently by hackers who put the stolen servers to…
DevSecOps is an Abomination!
Dr. Frankenstein’s monster is one of the most hated and misunderstood monsters of all time. Frankenstein brought his creation…
DevOps Security at Scale
This is the third blog post in a series discussing how high-performing DevOps teams build secure systems at scale….
DevOps Security at Scale
This is the second blog post in a series discussing how high-performing DevOps teams build secure systems at scale….
The Secure Task Runner
Even if you’ve never heard of Jenkins, you might be benefiting from it already: many companies and open source…
DevOps Security at Scale
This is the first installment in a series of blog posts on this topic. Years have passed since the software…
Untangling Jenkins
Our Jenkins cluster had become a paralyzing mass of jobs, executor dependencies, and general complexity, not what you want…
Introducing the Conjur DevOps Security Blog
We know it takes a lot to get a secure cloud automation project into production. Every day we are helping…