Strategies for secure identity management in hybrid environments

In this Help Net Security interview, Charlotte Wylie, SVP and Deputy CSO at Okta, discusses the challenges of managing user identities across hybrid IT environments. She emphasizes balancing and adopting comprehensive security controls, including cloud… Continue reading Strategies for secure identity management in hybrid environments

Passwords/password hashes in plaintext in service configs – why is this common practice?

A while ago I wanted to deploy a service using a OCI (docker/podman) container, and I noticed to me, what seemed like a possibly distributing trend. In the build file for a lot of the containers, the password is put there in plain text in … Continue reading Passwords/password hashes in plaintext in service configs – why is this common practice?

Is it bad practice to prompt users to reset password when there is no evidence of a breach?

I have received many security emails from LinkedIn over the past few weeks. An example is shown below (redaction mine)

I do not live in the USA and I did not try to access LinkedIn at the times these were received.
Two things suggested to… Continue reading Is it bad practice to prompt users to reset password when there is no evidence of a breach?

What are the best practices for a scheduled program to store credentials to access a secure resource?

If I have a program that runs on a regular basis, such as a cron job or systemd timer and it needs to access a secure resource like a hsm or encrypted database, what are the best practices to store/access the credentials to it?

Continue reading What are the best practices for a scheduled program to store credentials to access a secure resource?