all tags
How to Handle Secrets in Docker

How to Handle Secrets in Docker

DevOps engineers must handle secrets with care. In this series, we summarize best practices for leveraging secrets with your everyday tools.

How GitGuardian and Delinea Solve Improper Offboarding of NHIs at Scale

How GitGuardian and Delinea Solve Improper Offboarding of NHIs at Scale

Learn how GitGuardian and Delinea solve the growing problem of improper offboarding for Non-Human Identities (NHIs). Discover why orphaned secrets are a top security risk and how to automate their lifecycle management.

How to Securely Access AWS from your EKS Cluster

How to Securely Access AWS from your EKS Cluster

Discover EKS Pod Identity Association—the modern, secure way to grant AWS permissions without the operational overhead of OIDC providers. No more duplicated IAM roles across clusters, no more trust policy updates every time you scale.

Symmetric Cryptography in Practice: A Developer's Guide to Key Management

Symmetric Cryptography in Practice: A Developer's Guide to Key Management

Symmetric cryptography powers everything from HTTPS to JWT tokens, but key management remains a significant challenge. This developer guide covers three critical use cases—session keys, self-use keys, and pre-shared keys—with practical strategies for secure generation, rotation, and storage.

SharePoint Zero-Day Exploits Highlight Hidden Secrets Risk in Document Collaboration Tools

SharePoint Zero-Day Exploits Highlight Hidden Secrets Risk in Document Collaboration Tools

The recent SharePoint zero-day exploits expose a critical blind spot: hardcoded secrets hidden in collaboration tools. While teams secure code repositories, API keys and credentials lurking in SharePoint documents create dangerous attack vectors for lateral movement.

Start your journey to secrets-free source code

And keep your secrets out of sight