Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!
Using Kubernetes ConfigMaps and Secrets for Sensitive Data Kubernetes provides two...
Recently I have started to use the Jasypt CLI tools. Before that, I have always had to use the...
Table des matières SOPS - Secrets encryptés dans un dépôt GIT Partager ses secrets en...
Storing sensitive data like database passwords and API keys in Terraform state files poses...
We are very proud of the work we put into the GitGuardian dashboard UI, helping security teams find...
This blog post demonstrates how to create these essential alarms using Terraform, an infrastructure-as-code tool. By leveraging Terraform, you can automate the process of setting up notifications for potential security risks, ensuring that your sensitive information and encryption keys remain protected.
Have you ever found yourself struggling with sensitive files that shouldn't be committed to your main...
Leave use config/secrets.yml file in Ruby in Rails
How I manage secrets as a solo dev, using age and git
In Kubernetes, separating configuration from code is essential for creating flexible, secure...
Security comes down to trust. In DevOps and in our applications, it really is a question of "should...
🔔 What’s New? AWS has announced that AWS Code Pipeline now supports using AWS Secrets Manager inside...
In the fast-paced world of software development, security should always be a top priority. A critical...
Introduction In modern software development, Kubernetes has become a cornerstone for container...
When talking to potential customers at GitGuardian, we often get asked, "Can we use GitGuardian to...
In the fast-paced world of modern software development, secrets management often becomes a blind...
Protecting sensitive data in code is crucial, especially in times when breaches are increasingly...
Kubernetes Secrets Management Managing sensitive data, such as passwords, tokens, and...
Kubernetes Secrets and ConfigMaps In Kubernetes, managing configuration and sensitive data...
Key vaults define security boundaries for stored secrets. It allows you to securely store service or...