all tags
How Popular Malware Is Stealing Credentials and What You Can Do About It

How Popular Malware Is Stealing Credentials and What You Can Do About It

Credentials are prime targets for attackers, as they make it easy to access resources as legitimate users without discovering vulnerabilities or using technical exploits. Malware authors know how interesting these low-hanging fruits are and are coming after your secrets!

A Comprehensive Guide to SOPS: Managing Your Secrets Like A Visionary, Not a Functionary

A Comprehensive Guide to SOPS: Managing Your Secrets Like A Visionary, Not a Functionary

Have you heard about SOPS? If you have already been in a situation where you needed to share sensitive information with your teammates, this is for you. Today, let's have a look at how it works and how to use it with various key management services such as AWS KMS and HashiCorp Vault.

Multicloud Security Architecture

Multicloud Security Architecture

Using multiple cloud service providers isn't all benefits, it has its challenges. Today, let's have a look at multicloud: What it is, what are the challenges, especially security challenges, and what are the best practices towards a secure multicloud architecture.

Start your journey to secrets-free source code

And keep your secrets out of sight

arrow-down