kubernetes secrets

Stop Using Kubernetes Secrets: A Guide to Better Security Alternatives

| | DEVOPS, security
Kubernetes Secrets were designed to manage sensitive data, but they come with inherent security vulnerabilities, management complexities, and compliance challenges. This blog dives into the limitations of Kubernetes Secrets, from lack of default encryption to difficulties with scalability and integration, and explores more secure alternatives. The post Stop Using Kubernetes ... Read More
ephemeral credentials

Why You Should Only Use Just-in-Time, Ephemeral Credentials

| | Uncategorized
Introduction to Ephemeral Credentials In today’s fast-paced digital landscape, application security is of paramount importance. As organizations adopt distributed architectures, the challenge of securely managing secrets such as API keys, database credentials, and certificates has intensified. Traditional static credentials, while once sufficient, are now a significant security risk. The need ... Read More
encryption vs tokenization

Tokenization vs Encryption: How to Choose the Best Data Security Approach

As digital systems and data continue to expand in complexity, protecting sensitive information has become crucial—not only to prevent costly breaches but also to meet strict privacy regulations. Two popular methods for keeping data safe are tokenization and encryption. Although both serve to protect sensitive information, they work in distinct ... Read More
kubernetes secrets management

Bulletproof Kubernetes Secrets Management: Common Challenges and Solutions

This blog explores the common challenges of Kubernetes secrets management, including encryption gaps and access control issues, and provides proven solutions to secure sensitive data across multi-cloud environments. Strengthen your Kubernetes security posture today. The post Bulletproof Kubernetes Secrets Management: Common Challenges and Solutions appeared first on Akeyless ... Read More
secrets management for ci/cd

The Hidden Risks of Secrets Mismanagement in CI/CD Pipelines

This blog uncovers the hidden risks of poorly managed secrets in CI/CD pipelines, from hardcoded credentials to excessive permissions, and provides actionable strategies to secure your workflows, protect sensitive data, and streamline deployments. The post The Hidden Risks of Secrets Mismanagement in CI/CD Pipelines appeared first on Akeyless ... Read More
Fireside Chat: Adam Arellano Global CISO & Oded Hareven Akeyless CEO

Tackling Identity Management Challenges at Scale: Insights from Adam Arellano, Former PayPal VP of Cybersecurity

How do you manage identity challenges at scale? Former PayPal CISO Adam Arellano shares insights on machine identity, automation, and simplifying security tools in this fireside chat with Akeyless CEO Oded Hareven. The post Tackling Identity Management Challenges at Scale: Insights from Adam Arellano, Former PayPal VP of Cybersecurity appeared ... Read More
secrets management compliance

Simplifying Secrets Management for Compliance (DORA, C5, and NIS2)

Explore how secrets management can help tackle the compliance challenges of DORA, C5, and NIS2, streamlining processes and reducing risks while enhancing security. The post Simplifying Secrets Management for Compliance (DORA, C5, and NIS2) appeared first on Akeyless ... Read More
Fireside Chat: Oded Hareven Akeyless CEO & Ross Young, former CISO of Caterpillar Financial

Why Identity-Based Attacks Are on the Rise: Insights from Former CISO of Caterpillar Financial

| | CISO, Fireside Chat, Infosec, security
Why are identity-based attacks on the rise, and what can CISOs do to stop them? In this fireside chat, Ross Young, former CISO of Caterpillar Financial, shares insights with Akeyless CEO Oded Hareven on securing machine identities, managing secrets, and staying ahead of evolving cyber threats. The post Why Identity-Based ... Read More
secret silos

Beyond Silos: How to Streamline Secrets Management Across Platforms

| | DEVOPS, Infosec
This blog explores the challenges of vault sprawl, including its impact on security, cost, and complexity, and offers actionable solutions for managing secrets across environments, whether through consolidation or centralized visibility. The post Beyond Silos: How to Streamline Secrets Management Across Platforms appeared first on Akeyless ... Read More
Oded Hareven, CEO & Co-founder of Akeyless Security and Adm. Michael Rogers (Full)

The Rise of Machine Identities: Admiral Mike Rogers Discusses the Next Cybersecurity Frontier

Discover key insights from a fireside chat between Akeyless CEO Oded Hareven and Admiral Mike Rogers, former NSA Director, as they explore the challenges of machine identity management and innovative strategies to simplify and secure the future of cybersecurity. The post The Rise of Machine Identities: Admiral Mike Rogers Discusses ... Read More
Loading...