Security
Detect Risky Behavior with Akeyless & DatadogExpand your Akeyless monitoring activities by automatically forwarding your Akeyless logs to Datadog for ongoing alerts of outlying behaviors. Learn how in this blog post.
Security
Detect Risky Behavior with Akeyless & DatadogExpand your Akeyless monitoring activities by automatically forwarding your Akeyless logs to Datadog for ongoing alerts of outlying behaviors. Learn how in this blog post.
Security
DevSec For Scale Podcast Ep 5: Cloud Security for StartupsStartups have a different makeup than large organizations. Their DNA is just different as they are more lean and agile. This offers startup developers the ability to shift their security as far left as possible and make the right moves from the beginning to secure their infrastructure and applications. However, not all startups have a […]
Security
Disrupting the Kill Chain with Just-in-Time AccessAdversaries have many devious ways to get access to an organization’s data, for different reasons, including data theft or ransom. Many of their actions can be categorized in different steps as part of a concept known in cyber security as a kill chain. Meanwhile, security teams are looking for ways to break this chain, and […]
Security
DevSec For Scale Podcast Ep 4: Shift-Left Product SecurityProduct security is a big subject. You have to consider aspects ranging from design to code reviews to static code analysis to CI/CD and through deployment and scaling. Not only that, the security focus changes as you grow into a larger organization and through IPO or M&A. Neatsun Ziv, CEO of Ox Security, formerly VP […]
Security
DevSec For Scale Podcast Ep 3: Improving Software Supply Chain TrustSupply chains are found everywhere in our world from food to clothing to school supplies. For each item that is built or created there is a chain of suppliers for each piece of the final item. The famous example is the pencil. Something as simple as a pencil actually takes numerous suppliers of graphite, wood, […]
News | Security
How Your Vendor’s Security Practices Impact Your BusinessAkeyless puts security at the heart of its service. The confidentiality, integrity, and availability of our customer’s data are our top priorities. We understand (and as a security company, we encourage) that our customers do not blindly trust their vendors. Engaging with any vendor that handles your most sensitive data and infrastructure, requires a high […]
News
Why Progress Uses Akeyless to Support their Hybrid Multicloud StrategyProgress Software Corporation (Progress) offers software for creating and deploying business applications. Progress is headquartered in Burlington, Massachusetts with offices in 16 countries and employs approximately 2100 people. From an organizational perspective, the company is broken down into different divisions, which have individual responsibilities, including application and digital experience, as well as creating tools and/or […]
Security
DevSec For Scale Podcast Ep 2: Minimum Viable SecurityLet’s be real. Security is not at the top of the priority list for developers… especially at smaller companies that are pushing to get out an MVP as quickly as possible. Well, there is a solution, and it’s called MVS or minimum viable security. This approach lays the groundwork for companies to ensure they build […]
Security
Zero Standing Privileges in Production EnvironmentsIn this demo, VP R&D Ori Mankali gives us a look into a simple application that uses GitLab in which he builds and deploys a Docker image to Docker Hub and uses that to pull the application, which is running on Amazon EKS. The demo will show the initial state of the application and then […]
Security
Why All Organizations Benefit From Centralized Secrets ManagementToday, the surge of automation and containerization can be found in organizations of all sizes. No matter which industry, hybrid multicloud workloads that operate within agile DevOps environments are now central to maintaining a competitive edge, creating great end-user experiences, and increasing employee efficiency. On the other side of the coin, these organizations also still […]
Security
DevSec For Scale Podcast Ep 1: Startup Security Best PracticesThe DevSec For Scale Podcast and Meetup have arrived! We have a single mission with this community: “Making security a first-class citizen in young and growing companies.” Our first podcast guest is one of our good friends, Dr. Chase Cunningham. Chase has been a great asset as an Advisory Board member and was also a […]
This post was written based on the work of Fahmy Khadiri, Technical Sales Account Manager at Akeyless, in his voice. Introduction In this blog post, I’ll be walking you through Kubernetes authentication and secrets injection using native Kubernetes constructs and the Akeyless Secrets Injection Webhook to fetch secrets from Akeyless Vaultless® Platform into your Kubernetes […]