Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Keeping Secrets Out of Logs: Building a Robust Defence Against Log Leaks

Ever found sensitive data in your logs? You're not alone - even tech giants like Google and Facebook have faced this challenge. Watch this actionable webinar on keeping secrets out of logs featuring our special guest speaker, Allan Reyes. �������� ������'���� ����������: No theoretical fluff - just practical solutions that you can start using tomorrow. Perfect for security engineers, developers, and tech leads who want to sleep better at night knowing their logs aren't accidentally exposing sensitive data.

Trusted Computing: The Role of Infrastructure IAM

The role of trust for both employees and customers has come under increased scrutiny in the past decade. The rise of concepts such as zero trust for the workforce and the privacy/personalisation paradox for customers has moved trust from being an exercise in academic rigour, to one which has realigned enterprise security architecture choices.

It's Finally Time to Embrace Trusted Computing

Does your corporate network treat users on VPNs as trusted regardless of who they are? Does your web server connect to its database as a fictitious user with a password in a config file somewhere? Or perhaps the most frightening scenario: did your platform engineer log in as root to configure your CI/CD pipeline toolchain? These three situations are all examples of anonymous users – someone taking action somewhere on your network or in one of your cloud accounts without identifying themselves.

Teleport's Evolution: Today's Name Changes Reflect a Strategic Shift in Infrastructure Security

As the world of infrastructure security grows more complex, maintaining clarity and precision in how we present our solutions is critical. Teleport’s platform's capabilities have expanded significantly over time. To better align with our mission and help customers understand the full potential of our platform, we are introducing new names for our product suite.

Kubescape Joins CNCF Incubation: A Major Milestone in Kubernetes Security

We’re excited to announce that Kubescape has officially entered the CNCF Incubating stage! This achievement marks a huge step for the project. The 2021 idea, devised by Ben Hirschberg, ARMO CTO and Co-founder, to create a simple tool for scanning Kubernetes clusters against NSA-CISA hardening guidelines, has since developed, expanded, improved and matured. Kubescape is now a robust, full-fledged security platform, all thanks to the amazing support from the Kubescape community and CNCF.

Stay Ahead of Kubernetes Security: ARMO Platform Now Supports CIS Kubernetes Benchmark v1.10

Kubernetes security is an evolving challenge, and staying compliant with industry best practices is crucial. That’s why we’re excited to announce that ARMO now supports the latest CIS Kubernetes Benchmark v1.10! Get your Kubernetes Security Checklist now.

Why Immutable Backups Are Essential for Data Security in DevOps

Immutable backups (IB) are a robust defense mechanism against the consequences of cyberattacks. The latter can be considered an “evolving constant,” while DevOps environments closely link development and operations. IT teams adopt CI/CD pipelines and centralized applications utilizing multi-cloud deployment. And that usually translates into a growing attack surface (check 2024 DevOps Threats Unwrapped).