How to create and manage Kubernetes Secrets in Portainer

Instead of keeping Secrets in Kubernetes manifests, store them separately. Portainer makes this quite simple; I’ll show you how in this tutorial.
The post How to create and manage Kubernetes Secrets in Portainer appeared first on TechRepublic.
Continue reading How to create and manage Kubernetes Secrets in Portainer

Reducing the Risk of Credential Leakage

Long-term cloud credentials are often scattered throughout source code, on laptops or desktops, on servers, in cloud resources and in other locations. It’s easy to copy them across machines, creating credential sprawl that increases your leakage risk…. Continue reading Reducing the Risk of Credential Leakage

Secrets Detection: An Emerging AppSec Category

Applications are no longer standalone monoliths, they now rely on thousands of independent building blocks: cloud infrastructure, databases, SaaS components such as Stripe, Slack and HubSpot, just to name a few. This is a significant shift in software… Continue reading Secrets Detection: An Emerging AppSec Category

Video: Managing Digital Certificates in DevOps – Keyfactor

Digital certificates (e.g. SSL/TLS, X.509) can be issued and managed through many different tools in your DevOps tool-chain. However, the more tools you have for managing the issuance of these certificates lead to gaps in security governance and o… Continue reading Video: Managing Digital Certificates in DevOps – Keyfactor

Forsooth! What Sort Of Villainy Makes It’s Evil Pestilence Known?

Apparently, Amazon.com, Inc. (Nasdaq: AMZN) has taken up the $10 Billion Evil Gauntlet and is running with it (kids, don’t do that at home…), if reports are to be believed. Read it and weep for the Interweb’s lowly bookseller, turned to the darkside… Continue reading Forsooth! What Sort Of Villainy Makes It’s Evil Pestilence Known?

Hacker Compromises Air Force Captain to Steal Sensitive Drone Info

The thief also had a second dataset, including the M1 Abrams maintenance manual, a tank platoon training course, a crew survival course and documentation on improvised explosive device (IED) mitigation tactics. Continue reading Hacker Compromises Air Force Captain to Steal Sensitive Drone Info