#devsecops
Read more stories on Hashnode
Articles with this tag
We've talked about how Continuous Integration and Continuous Delivery (CI/CD) tools can be a source of secrets sprawl. While it's not as insecure as...
Protecting sensitive data is a crucial responsibility for modern businesses. To ensure the security of critical information, organizations utilize...
Learn step-by-step techniques and best practices to handle secrets in Helm charts safely and effectively. Level up your Helm deployments...
Let's start with a story: have you heard the news about CircleCI's breach? No, not the one where they accidentally leaked some customer credentials a...
In my previous tutorials, we looked at Azure Key Vault and Google Secret Manager: How to Handle Secrets with Azure Key Vault: In this piece, we had a...
By C.J. May Code review is an important part of the development process that can help to identify issues with the quality of the software. Secure code...