Tiexin GuoPulumi VS Terraform: The Definitive Guide to Choosing Your IaC ToolThe definitive showdown between Pulumi and Terraform. Tips and FAQ included. Choose the right tool for the job.Feb 271Feb 271
Dwayne McdanielEvaluating The GitGuardian Secrets Detection Platform: A Self-Guided RoadmapLet’s face it: acquiring enterprise security software can feel daunting. There are so many competing security priorities in the enterprise…Feb 20Feb 20
Dwayne McdanielChiBrrCon IV: Understanding risks and the role of the CISOThere are a lot of fun facts to know about Chicago. You might have heard about the multi-topping hot dogs, the skyscrapers, or the fact the…Feb 8Feb 8
Dwayne McdanielEvaluating Secrets Detection Platforms Is Complex: GitGuardian is here to help you navigate the…Everyone loves buying new tools (or not). It feels good to be able to use a new platform or technology to address an issue in the…Jan 30Jan 30
Tiexin GuoThe New Frontier in Cybersecurity: Embracing Security as CodeSecurity as Code (SaC) is often used with DevSecOps, but what does it mean exactly? Learn best practices for a more secure dev process.Jan 29Jan 29
Dwayne McdanielGood Application Security Posture Management Requires Great DataRecently, the cybersecurity industry has been using the term ‘security posture” to describe an organization’s overall security and response…Jan 17Jan 17
Greg BulmashSecure Your Secrets with .envUsing environment variables to store secrets instead of writing them directly into your code is one of the quickest and easiest ways to…Jan 11Jan 11
Thomas SeguraUnderstanding the Risks of Long-Lived Kubernetes Service Account TokensThe popularity of Kubernetes (K8s) as the defacto orchestration platform for the cloud is not showing any sign of pause. This graph, taken…Jan 11Jan 11
C.J. MayHow to Become Great at API Key Rotation: Best Practices and TipsSecret management can be a complex challenge. In this article, we will take you from zero to hero on key rotation.Dec 28, 2023Dec 28, 2023
Dwayne McdanielHoneytokens For Peace Of Mind: Using Cyber Deception To Buy Time To Remediate At ScaleNo matter what part of the organization you work in, there is one thing everyone wants: a good night’s sleep. Everybody, from operations to…Dec 22, 2023Dec 22, 2023