CI-CD

How to Unite Developers, DevOps, and Security Without Slowing Down
5 min readBuilders and protectors don’t have to clash – they just need a common path. The post How to Unite Developers, DevOps, and Security Without Slowing Down appeared first on Aembit ...

Shadow downloads – How developers have become the new perimeter
With great power comes great responsibility ...

GitHub Action Supply Chain Breach Exposes Non-Human Identity Risks in CI/CD
4 min readLong-lived credentials and secrets fueled the attack. The post GitHub Action Supply Chain Breach Exposes Non-Human Identity Risks in CI/CD appeared first on Aembit ...

Non-Human Identity Security vs. Service Account Management: What’s the Difference?
3 min readIf you think non-human identity security is just service account management in disguise, you might be missing the bigger picture. The post Non-Human Identity Security vs. Service Account Management: What’s ...

Eric Brüggemann on Code Intelligence Launching Spark
Eric Brüggemann, CEO of Code Intelligence, introduces Spark, their new AI-driven security testing tool. Spark automates vulnerability detection by integrating into CI/CD pipelines and eliminating the need for developers to manually write ...

Why Scalability Matters in Non-Human Identity and Access Management
6 min readFrom dynamic workloads to API-driven systems, managing non-human identities requires a new approach to security at scale. The post Why Scalability Matters in Non-Human Identity and Access Management appeared first ...

The Hidden Risks of Secrets Mismanagement in CI/CD Pipelines
This blog uncovers the hidden risks of poorly managed secrets in CI/CD pipelines, from hardcoded credentials to excessive permissions, and provides actionable strategies to secure your workflows, protect sensitive data, and streamline ...

Measuring and Increasing Code Quality
At some point in a CTO’s career questions will be raised about “code quality” under their watch. Engineering teams will typically associate code quality with bugs and feature release velocity, while Product ...

Announcing Role-Based Resource Sets for Aembit Workload IAM
3 min read https://www.youtube.com/watch?v=QSnJz7X-qLo Today we are pleased to announce Resource Sets, a new capability that allows administrators to group related resources and policies into isolated sets, each with specific role-based access ...

Optimizing CI/CD Security: Best Practices for a Robust Software Delivery Pipeline
5 min read Modern software development accelerates progress but introduces security risks that must be managed to protect organizational integrity and reputation. The post Optimizing CI/CD Security: Best Practices for a Robust ...