Security
Detect Risky Behavior with Akeyless & DatadogExpand your Akeyless monitoring activities by automatically forwarding your Akeyless logs to Datadog for ongoing alerts of outlying behaviors. Learn how in this blog post.
Security
Detect Risky Behavior with Akeyless & DatadogExpand your Akeyless monitoring activities by automatically forwarding your Akeyless logs to Datadog for ongoing alerts of outlying behaviors. Learn how in this blog post.
Security
DevSec For Scale Podcast Ep 5: Cloud Security for StartupsStartups have a different makeup than large organizations. Their DNA is just different as they are more lean and agile. This offers startup developers the ability to shift their security as far left as possible and make the right moves from the beginning to secure their infrastructure and applications. However, not all startups have a […]
Security
Disrupting the Kill Chain with Just-in-Time AccessAdversaries have many devious ways to get access to an organization’s data, for different reasons, including data theft or ransom. Many of their actions can be categorized in different steps as part of a concept known in cyber security as a kill chain. Meanwhile, security teams are looking for ways to break this chain, and […]
Security
DevSec For Scale Podcast Ep 4: Shift-Left Product SecurityProduct security is a big subject. You have to consider aspects ranging from design to code reviews to static code analysis to CI/CD and through deployment and scaling. Not only that, the security focus changes as you grow into a larger organization and through IPO or M&A. Neatsun Ziv, CEO of Ox Security, formerly VP […]
Security
DevSec For Scale Podcast Ep 3: Improving Software Supply Chain TrustSupply chains are found everywhere in our world from food to clothing to school supplies. For each item that is built or created there is a chain of suppliers for each piece of the final item. The famous example is the pencil. Something as simple as a pencil actually takes numerous suppliers of graphite, wood, […]
News | Security
How Your Vendor’s Security Practices Impact Your BusinessAkeyless puts security at the heart of its service. The confidentiality, integrity, and availability of our customer’s data are our top priorities. We understand (and as a security company, we encourage) that our customers do not blindly trust their vendors. Engaging with any vendor that handles your most sensitive data and infrastructure, requires a high […]
Security
DevSec For Scale Podcast Ep 2: Minimum Viable SecurityLet’s be real. Security is not at the top of the priority list for developers… especially at smaller companies that are pushing to get out an MVP as quickly as possible. Well, there is a solution, and it’s called MVS or minimum viable security. This approach lays the groundwork for companies to ensure they build […]
Security
Zero Standing Privileges in Production EnvironmentsIn this demo, VP R&D Ori Mankali gives us a look into a simple application that uses GitLab in which he builds and deploys a Docker image to Docker Hub and uses that to pull the application, which is running on Amazon EKS. The demo will show the initial state of the application and then […]
Security
Why All Organizations Benefit From Centralized Secrets ManagementToday, the surge of automation and containerization can be found in organizations of all sizes. No matter which industry, hybrid multicloud workloads that operate within agile DevOps environments are now central to maintaining a competitive edge, creating great end-user experiences, and increasing employee efficiency. On the other side of the coin, these organizations also still […]
Security
DevSec For Scale Podcast Ep 1: Startup Security Best PracticesThe DevSec For Scale Podcast and Meetup have arrived! We have a single mission with this community: “Making security a first-class citizen in young and growing companies.” Our first podcast guest is one of our good friends, Dr. Chase Cunningham. Chase has been a great asset as an Advisory Board member and was also a […]
Security
Adapting Identities and Secrets To The Changing State of CybersecurityAkeyless was honored to have former NSA Director, Admiral Mike Rogers, open the sessions at KeyConf NYC’21. In his impressive career, Admiral Rogers held key positions around the globe, focusing on cyber, intelligence, and national security. From his expert vantage point, he presented his insights on the current state of cybersecurity, and what organizations need […]
Security
How to Win at Zero TrustThe recent KeyConf NYC’21 event featured a very interesting session, presented by none other than former Forrester analyst, Dr. Zero Trust, Dr. Chase Cunningham. He showed the audience how Zero Trust is sometimes overthought and when you apply the most important and fundamental Zero Trust steps, you start winning at security, in big numbers. Zero […]