Simplify access and management of your secrets (credentials, certificates, and keys) and accelerate your hybrid multicloud and DevOps initiatives.
AKEYLESS BLOG
CategoriesGet started with Akeyless -
News
Akeyless $65M Round B: Reimagining Secrets Management
We’re excited to announce that we have raised a Series B round of $65 million! The funding round was led by NGP Capital with the participation of our existing investors Team8 Capital and Jerusalem Venture Partners (JVP). -
DevOps Security
Why Secrets Rotation for On-Prem Infrastructure Matters
Credential rotation isn’t always simple or easy. Enter Universal Identity, a lightweight authentication method you can implement on any operating system. -
DevOps Security
How to Solve the Secret Zero Problem with Akeyless
Let’s do a deep dive into the secret zero problem: what it is and how you can solve it with an innovative new approach. -
DevOps
Using External Secrets Operator with Akeyless Secrets Orchestration
Learn about the External Secrets Operator for Kubernetes open source project, and how you can use it with Akeyless secrets. -
Security
The Secrets Behind Uber’s Breach
Join our CEO Oded Hareven and Admiral Michael S. Rogers of Team8 as they discuss the implications behind the recent Uber breach. -
Security
4 Dimensions to Securing Machine Identities
Machine identities need access to a vast amount of secrets, which need to be securely orchestrated when needed. Let’s look at four ways in which a secrets management solution can help to secure machine identities. -
Product Updates
Now Available: Securing Rancher Cluster Secrets With Akeyless
In our effort to enable our users to manage and secure secrets across any tool and environment, we recently added the ability for Rancher Kubernetes Engine (RKE) clusters to authenticate directly with Akeyless. In this post, we will go through why this is important, how this makes your life easier, and walk you through the […] -
Security
3 Things To Look Out For When Using Cloud Vaults
Cloud Service Providers (CSPs) such as Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP) have enabled the widespread move of organizations to the cloud. Using workloads in the cloud accelerates an organization’s key initiatives such as mobility, collaboration tools, scale-out apps, and business continuity. These workloads need to communicate with other workloads, or […] -
Security
Secure Your Kubernetes with Akeyless Secrets Orchestration
Explore the Akeyless Kubernetes plug-in and how you can use it to achieve enterprise-level security for Kubernetes secrets. -
Security
Just-In-Time: The Next Level of Software Supply Chain Security
As explained in a recent blog post, Software Supply Chain Attacks are prevalent in today’s corporate infrastructures. In a supply chain attack, attackers make their way into the chain of resources that make up the final software product, frequently by abusing valid credentials they obtained due to careless programming practices (Secret Sprawl). Once they have […] -
Security
Combating Insider Threats from the Inside Out
Insider threats are one of the most difficult risks for security teams to manage because most employees require some level of trust and privileges to perform their roles. Managing this risk involves detecting and containing the undesirable behavior of trusted accounts in the organization. This undesirable behavior often goes undetected for a long time. Insider […]