Tutorials

A collection of 32 posts

A Comprehensive Guide to SOPS: Managing Your Secrets Like A Visionary, Not a Functionary

A Comprehensive Guide to SOPS: Managing Your Secrets Like A Visionary, Not a Functionary

Have you heard about SOPS? If you have already been in a situation where you needed to share sensitive information with your teammates, this is for you. Today, let's have a look at how it works and how to use it with various key management services such as AWS KMS and HashiCorp Vault.

How to Handle Secrets in Helm

How to Handle Secrets in Helm

Learn step-by-step techniques and best practices to handle secrets in Helm charts safely and effectively. Level up your Helm deployments today!

Securing Containers with Seccomp

Securing Containers with Seccomp

In this article we present a novel way to protect your container applications post-exploitation. This additional protection is called Seccomp-BPF.

Streamlining CLI Authentication: Implementing OAuth Login in Python

Streamlining CLI Authentication: Implementing OAuth Login in Python

When building an application that requires user authentication, implementing a secure login flow is critical. In this article, we'll walk through how we created a robust OAuth login flow for ggshield, our Python-based command line tool, to streamline the onboarding process for our users.

Pulumi VS Terraform: The Definitive Guide to Choosing Your IaC Tool

Pulumi VS Terraform: The Definitive Guide to Choosing Your IaC Tool

Tiexin Guo Senior DevOps Consultant, Amazon Web Services Author | 4th Coffee In the cloud-native era, Infrastructure as Code (IaC; read more about it in this blog here) has become the de-facto standard for managing cloud infrastructure, and more. While Terraform has been around for

Ethical Hacking Q&A with Sonya Moisset

Ethical Hacking Q&A with Sonya Moisset

Join Mackenzie Jackson and Sonya Moisset for an eye-opening discussion about Ethical Hacking as Sonya answers questions from Mack and the webinar audience.

arrow-down