Simplify access and management of your secrets (credentials, certificates, and keys) and accelerate your hybrid multicloud and DevOps initiatives.
AKEYLESS BLOG
CategoriesGet started with Akeyless -
Security
DevSec for Scale Podcast Ep 6: Policy-as-Code
Policy-as-code is a relatively new methodology of managing and automating security policies through code. Eran Bibi, co-founder and CPO of Firefly and former R&D Director of Aqua Security, talked with me about how DevOps engineers can harness the power of policy-as-code to validate and secure their cloud deployments. In this interview, we talk about how […] -
Security
Detect Risky Behavior with Akeyless & Datadog
Expand your Akeyless monitoring activities by automatically forwarding your Akeyless logs to Datadog for ongoing alerts of outlying behaviors. Learn how in this blog post. -
Security
DevSec For Scale Podcast Ep 5: Cloud Security for Startups
Startups have a different makeup than large organizations. Their DNA is just different as they are more lean and agile. This offers startup developers the ability to shift their security as far left as possible and make the right moves from the beginning to secure their infrastructure and applications. However, not all startups have a […] -
Security
Disrupting the Kill Chain with Just-in-Time Access
Adversaries have many devious ways to get access to an organization’s data, for different reasons, including data theft or ransom. Many of their actions can be categorized in different steps as part of a concept known in cyber security as a kill chain. Meanwhile, security teams are looking for ways to break this chain, and […] -
Security
DevSec For Scale Podcast Ep 4: Shift-Left Product Security
Product security is a big subject. You have to consider aspects ranging from design to code reviews to static code analysis to CI/CD and through deployment and scaling. Not only that, the security focus changes as you grow into a larger organization and through IPO or M&A. Neatsun Ziv, CEO of Ox Security, formerly VP […] -
News
Why Stash Uses Akeyless To Uplevel Security And Accelerate DevOps Workflows
Founded in 2015, Stash is a fast-growing banking and investment platform that allows its customers to invest and build wealth. Its founders, Brandon Krieg and Ed Robinson, former Wall Street veterans, wanted to make investing easy and affordable for everyone. Today, Stash has over 400 employees, helping over 6 million people create a more secure […] -
Security
DevSec For Scale Podcast Ep 3: Improving Software Supply Chain Trust
Supply chains are found everywhere in our world from food to clothing to school supplies. For each item that is built or created there is a chain of suppliers for each piece of the final item. The famous example is the pencil. Something as simple as a pencil actually takes numerous suppliers of graphite, wood, […] -
News Security
How Your Vendor’s Security Practices Impact Your Business
Akeyless puts security at the heart of its service. The confidentiality, integrity, and availability of our customer’s data are our top priorities. We understand (and as a security company, we encourage) that our customers do not blindly trust their vendors. Engaging with any vendor that handles your most sensitive data and infrastructure, requires a high […] -
News
Why Progress Uses Akeyless to Support their Hybrid Multicloud Strategy
Progress Software Corporation (Progress) offers software for creating and deploying business applications. Progress is headquartered in Burlington, Massachusetts with offices in 16 countries and employs approximately 2100 people. From an organizational perspective, the company is broken down into different divisions, which have individual responsibilities, including application and digital experience, as well as creating tools and/or […] -
Security
DevSec For Scale Podcast Ep 2: Minimum Viable Security
Let’s be real. Security is not at the top of the priority list for developers… especially at smaller companies that are pushing to get out an MVP as quickly as possible. Well, there is a solution, and it’s called MVS or minimum viable security. This approach lays the groundwork for companies to ensure they build […] -
Security
Zero Standing Privileges in Production Environments
In this demo, VP R&D Ori Mankali gives us a look into a simple application that uses GitLab in which he builds and deploys a Docker image to Docker Hub and uses that to pull the application, which is running on Amazon EKS. The demo will show the initial state of the application and then […]