all tags
Wake-up call: why it's urgent to deal with your hardcoded credentials and secrets

Wake-up call: why it's urgent to deal with your hardcoded credentials and secrets

The figures are precise: stolen credentials remain the most common cause of a data breach. So how are there still thousands of hardcoded secrets hiding in source code, CI/CD pipelines, or Docker images, and, more importantly, how should we deal with them?

Handling Secrets with AWS Secrets Manager

Handling Secrets with AWS Secrets Manager

This tutorial helps you better understand AWS Secrets Manager, how it works under the hood and how to access it from Kubernetes clusters.

How to Handle Secrets with Azure Key Vault

How to Handle Secrets with Azure Key Vault

This tutorial details how to manage secrets effectively using Azure Key Vault. You'll learn how to create secrets and access them in both virtual machines and Kubernetes clusters.

Start your journey to secrets-free source code

And keep your secrets out of sight

arrow-down