Simplify access and management of your secrets (credentials, certificates, and keys) and accelerate your hybrid multicloud and DevOps initiatives.
AKEYLESS BLOG
CategoriesGet started with Akeyless -
DevOps Security
How to Solve the Secret Zero Problem with Akeyless
Let’s do a deep dive into the secret zero problem: what it is and how you can solve it with an innovative new approach. -
DevOps
Using External Secrets Operator with Akeyless Secrets Orchestration
Learn about the External Secrets Operator for Kubernetes open source project, and how you can use it with Akeyless secrets. -
Security
The Secrets Behind Uber’s Breach
Join our CEO Oded Hareven and Admiral Michael S. Rogers of Team8 as they discuss the implications behind the recent Uber breach. -
Product Updates
Now Available: Securing Rancher Cluster Secrets With Akeyless
In our effort to enable our users to manage and secure secrets across any tool and environment, we recently added the ability for Rancher Kubernetes Engine (RKE) clusters to authenticate directly with Akeyless. In this post, we will go through why this is important, how this makes your life easier, and walk you through the […] -
Security
3 Things To Look Out For When Using Cloud Vaults
Cloud Service Providers (CSPs) such as Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP) have enabled the widespread move of organizations to the cloud. Using workloads in the cloud accelerates an organization’s key initiatives such as mobility, collaboration tools, scale-out apps, and business continuity. These workloads need to communicate with other workloads, or […] -
Security
Secure Your Kubernetes with Akeyless Secrets Orchestration
Explore the Akeyless Kubernetes plug-in and how you can use it to achieve enterprise-level security for Kubernetes secrets. -
Security
How Do Just-In-Time Secrets Help Secure Software Supply Chains?
The landscape of cybersecurity is continuously evolving. In this digital age where data is the new gold, the quest for secure privileged access is paramount. The dawn of static secrets, including credentials, certificates, and keys, has given rise to an innovative solution – Just-in-Time (JIT) Secrets Management. This approach has emerged as a game-changer in […] -
Security
Combating Insider Threats from the Inside Out
Insider threats are one of the most difficult risks for security teams to manage because most employees require some level of trust and privileges to perform their roles. Managing this risk involves detecting and containing the undesirable behavior of trusted accounts in the organization. This undesirable behavior often goes undetected for a long time. Insider […] -
Security
The Secret to Securing your Software Supply Chain
A software supply chain attack is a cyber attack where less secure elements in the chain such as third-party networks or code repositories are compromised by attackers as a means to embed hidden malware, which then finds its way into the infrastructures of organizations that use the final software. In these attacks, attackers try to […] -
Security
Extra Security for Kubernetes Secrets with Akeyless
Kubernetes is a popular open source tool for automating application development. While Kubernetes includes a basic solution for keeping secrets (passwords, tokens, or keys), most organizations need an extra layer of management and security to streamline development and protect against leaks. Let’s take a deeper look at what Kubernetes provides and how you can easily […] -
Security
DevSec For Scale Podcast Ep 7: Proactively Building Secure Software
Security is often an afterthought when it comes to designing and developing applications. Josh Grossman, CTO at Bounce Security and OWASP Israel Board member, talked to me about practical ways to build security into applications and the software development lifecycle. In this interview, we talk about OWASP and the open resources it provides for software […]