Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Secrets Management

Secrets Management vs Secrets Detection: Here's What You Need to Know

As the name might imply, it’s important to keep secrets secret. Access to even the smallest of secrets can open a window for attackers who can then escalate their access to other parts of the system, allowing them to find more important secrets along the way. Poor practices can leave many secrets lying around unprotected and just one seemingly unimportant secret can lead to a broad security breach.

Using Vanta and AWS for secrets management and encryption

This blog is part of a series about how to use Vanta and AWS to simplify your organization’s cloud security. To learn more about how to use Vanta and AWS, watch our Coffee and Compliance on-demand webinar. ‍ Amazon Web Services, or AWS, is one of the most popular cloud providers for organizations today — providing one of the most flexible and secure cloud environments available.

Key Manager Plus' feature highlights from 2023

Happy New Year from Key Manager Plus! Though years may pass, one thing that never changes is our commitment towards providing hassle-free certificate life cycle management for every enterprise. To stay true to this goal, over the years, our team has constantly improved its offerings to match user requisites and market needs, and 2023 was no different, with updates that redefined the administrative experience and enhanced product security.

Guardian Goofs: Signs Your Developers Are Leaking Secrets

Welcome to 2024 and a new monthly feature here at GitGuardian, a comic strip called "Guardian Goofs." If you like it, please show it some love by hitting one of those "share" links below it. And check back on the first Thursday of each month for the newest "Goof." Share this article on Twitter, HackerNews, LinkedIn, or Reddit.

Understanding Kubernetes secrets in a Kubernetes environment

As we know, in today’s era, most applications are deployed using Kubernetes. So that applications can function properly, and the users can use the applications without any issues. The applications sometimes require access to external resources, services or databases for processing or storing data. One of the most efficient ways of accessing sensitive data from other services is the secret object of the Kubernetes environment.