#devops
Read more stories on Hashnode
Articles with this tag
We've talked about how Continuous Integration and Continuous Delivery (CI/CD) tools can be a source of secrets sprawl. While it's not as insecure as...
Learn step-by-step techniques and best practices to handle secrets in Helm charts safely and effectively. Level up your Helm deployments...
Let's start with a story: have you heard the news about CircleCI's breach? No, not the one where they accidentally leaked some customer credentials a...
In my previous tutorials, we looked at Azure Key Vault and Google Secret Manager: How to Handle Secrets with Azure Key Vault: In this piece, we had a...
By C.J. May Code review is an important part of the development process that can help to identify issues with the quality of the software. Secure code...
In the realm of software development, Continuous Integration and Continuous Deployment (CI/CD) pipelines have become integral. They streamline the...