Secrets Management

A collection of 15 posts

Symmetric Cryptography in Practice: A Developer's Guide to Key Management

Symmetric Cryptography in Practice: A Developer's Guide to Key Management

Symmetric cryptography powers everything from HTTPS to JWT tokens, but key management remains a significant challenge. This developer guide covers three critical use cases—session keys, self-use keys, and pre-shared keys—with practical strategies for secure generation, rotation, and storage.

From Confidence to Competence: The Reality of Secrets Management

From Confidence to Competence: The Reality of Secrets Management

The confidence gap in secrets management is real: 75% of organizations feel secure while only 44% of developers follow best practices. Discover what security experts reveal about remediation challenges, responsibility issues, and practical solutions for protecting your most sensitive credentials.

Solving Secrets Management Challenges for NHIs: GitGuardian Integration with HashiCorp Vault

Solving Secrets Management Challenges for NHIs: GitGuardian Integration with HashiCorp Vault

Struggling with vault sprawl and NHI secrets? GitGuardian’s new HashiCorp Vault integration helps cybersecurity teams centralize secrets management, reduce blind spots, and strengthen security for today’s intricate infrastructures.

How to Handle Secrets in Configuration Management Tools

How to Handle Secrets in Configuration Management Tools

Configuration management tools like Ansible, Chef, and Puppet offer various methods for handling secrets, each with inherent trade-offs. The article explores these approaches alongside modern OIDC-based solutions that enable short-lived authentication tokens for automated processes.

Voice of Practitioners 2024

Voice of Practitioners 2024

Organizations spend 32.4% of security budgets on code security, yet only 44% of developers follow secrets management best practices. Get the full insights in our 2024 report.

How to Handle Secrets in Helm

How to Handle Secrets in Helm

Learn step-by-step techniques and best practices to handle secrets in Helm charts safely and effectively. Level up your Helm deployments today!

The Runtime Secrets' Security Gap

The Runtime Secrets' Security Gap

The last mile in secrets security is securing secrets in workloads. Discover a new way to securely deliver encrypted secrets in your infrastructure with innovative open-source tools, and say goodbye to plaintext secrets.

arrow-down