#security
Read more stories on Hashnode
Articles with this tag
Everyone loves buying new tools (or not). It feels good to be able to use a new platform or technology to address an issue in the organization. But...
We've talked about how Continuous Integration and Continuous Delivery (CI/CD) tools can be a source of secrets sprawl. While it's not as insecure as...
The popularity of Kubernetes (K8s) as the defacto orchestration platform for the cloud is not showing any sign of pause. This graph, taken from the...
No matter what part of the organization you work in, there is one thing everyone wants: a good night's sleep. Everybody, from operations to security...
Anyone who has tried to deal with secrets sprawl at scale will tell you it feels like a daunting task. On the surface, at first glance, it can seem...
GitGuardian’s Mackenzie Jackson had the privilege of hosting a webinar on ethical hacking with Snyk’s Sonya Moisset. What follows is a lightly edited...