Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DevOps

Container Security: Creating an Effective Security Program with Reachability Analysis

Containers have taken over the world of software development. According to Gartner analysts, “90% of global organizations will be running containerized applications in production by 2026,” up from 40% in 2021. Containerized applications provide enterprises with an agile, modern approach in the age of cloud computing; safeguarding these technologies from existing and future threats requires equally modern methods.

Kubernetes 1.30: A Security Perspective

Kubernetes 1.30 marks a significant milestone in the evolution of the widely used orchestration platform, particularly regarding security enhancements and developer experience. This post will explore updates encompassing secrets management, node and cluster management, data security and additional security measures. Each of these improvements strengthens the Kubernetes framework, making it a more secure and reliable platform for enterprises and developers.

The Build vs Buy Conundrum: Identity, Access, and Identity Federation Solutions

Managing user identities and access controls is a critical challenge for modern businesses. With remote work, cloud computing, and stringent data privacy regulations, organizations need robust identity and access management (IAM) solutions to ensure secure access to their applications and data. However, when it comes to implementing IAM, companies often face a choice: build a custom solution in-house or buy a third-party product.

What is Infrastructure as Code Security (IaC) - Risk, Challenges & Best Practices

In recent years, Infrastructure as Code (IaC) has emerged as a game-changer for managing IT operations. By enabling teams to define and manage infrastructure using codes, IaC offers numerous benefits, such as increased agility, scalability, and consistency. However, along with the advantages, some unique security challenges also arise that must be addressed promptly. Here in the blog, we’ll explore the best practices to maintain the integrity and reliability of the Infrastructure.

Manage secrets with AWS Secrets Manager with Python - Tech Tip Tuesday

In this video, we show exactly how to use AWS Secrets Manager and how to connect it with your Python application. Secrets are hard to manage and while using methods like storing them as environment variables in a.env file can be suitable, a more secure method particularly in a team is to use a secrets manager so developers can avoid ever needing to handle the plain text secret. Subscribe to the channel to get more Tech Tips on Tuesdays (and also other days)

Mend.io Launches Mend Container

While cloud-native development brilliantly solves problems related to scalability and effective resource use, a more complex architecture and new security challenges come along for the ride as well. The added layer of abstraction of container architecture can make tracking down vulnerabilities and poorly stored secrets, assessing true risk, and enforcing policies difficult for security teams using only traditional AppSec tools.

How LDAP is used in Active Directory

The primary protocol employed within Microsoft’s Active Directory(AD) is Lightweight Directory Access Protocol (LDAP). While LDAP serves as a fundamental component in AD, its application extends beyond, enabling user authentication in various tools and client environments. This includes Red Hat Directory Servers on UNIX systems and OpenLDAP, an open-source application used on Windows platforms.

LDAP Authentication, Configuration and Security Hardening - Signing, Binding and Configuring

Lightweight Directory Access Process (LDAP) serves as a user authentication mechanism tailored for directory services. This protocol is commonly employed by applications to retrieve resource data such as user profiles and various system elements. LDAP enables the identification of a client’s attributes with servers such as Active Directory, OpenLDAP, and Open DJ. Introduced in 1993, LDAP version 3 has been the Internet standard for directory services since 1997.

Introducing kntrl: Enhancing CI/CD Security with eBPF

CI/CD pipelines are formed by a series of steps that automate the process of software delivery. They integrate the practices of Continuous Integration (CI) and Continuous Delivery (CD) along with the tools, platforms, and repositories that enable them. Their goal is to simplify, streamline and automate large parts of the software development process.

Detect secrets in Slack channels with GitGUardian

Good news! GitGuardian can now help you find and remediate secrets exposed in Slack channels. You already know us for accurately detecting secrets in your code base. And now, we have extended the real-time detection capability to cover the world's most popular communications platform. Add Slack to your GitGuardian monitored perimeter, and help keep secrets sprawl out of your team communications channels!