DEVOPS SECURITY BLOG
December 6, 2019
Over the past decade, software development and information technology operations have become more integrated, spawning a new approach, commonly called…
November 26, 2019
We are thankful to have been a part of the four Kubernetes community filled days – five, including the day…
November 18, 2019
We have talked a lot about the speed at which DevOps innovation has moved and how security has consistently struggled…
November 6, 2019
We all want our Open Source projects to be clear and simple to contribute to and we may think that…
October 31, 2019
Admit it, you still write bash. Maybe a lot of bash. We all think we can avoid it, but we…
October 24, 2019
You are reading this on Conjur.org because you love DevOps, open source, Conjur, or maybe it’s the sound of my…
October 11, 2019
Ansible is an agentless management tool that can manage provisioning, configuration, and deployment of applications. RedHat acquired Ansible in 2015…
September 26, 2019
This week we sent some of our team to DevOpsDays Boston. As usual, the real strength of the event were…
September 17, 2019
When you are developing an application, there are some important things that should not fall into the hands of strangers….
September 11, 2019
The SSH or Secure Shell protocol has become the industry standard for logging into one computer from another. Engineers use…
August 29, 2019
CyberArk was happy to be a part of Jenkins World, aka DevOps World, which took place this year in San…
August 12, 2019
This is an article about washing dishes. This is also an article about DevOps, but mostly it’s about washing dishes….
August 8, 2019
Over the past decade, my career has evolved from Development to DevOps and most recently to DevSecOps. DevSecOps is the result of organizations…
July 31, 2019
If you are reading this, you probably got sucked into watching Game of Thrones when it first aired on HBO…
July 29, 2019
When talking about increasing development velocity for your teams, containers are at the forefront of the conversation on the new…
July 17, 2019
The Application Developer Access Dilemma As application developers, we need secure access to resources – such as databases, SSH servers,…
June 20, 2019
In this article, we’re going to talk about the problems surrounding authorization for your AWS account. We’ll define what those…
June 11, 2019
The DevOps culture shift and the move to continuous integration and deployment have required different tooling and utilities than previous…
June 7, 2019
Introduction KubeCon is the premiere conference for the Kubernetes and cloud-native communities. Every year it is held jointly with CloudNativeCon,…
May 31, 2019
It’s not an overstatement that in today’s world, it’s dangerous to expose software services to the public without robust security…
May 29, 2019
Before the dotcom bubble bust in the early 2000’s, “irrational exuberance” drove stock valuations for internet companies that offered free…
May 10, 2019
2015 wasn’t very long ago, but when we look at significant events in computing, that was the year that the…
April 26, 2019
What is Terraform? Terraform is a tool for managing infrastructure as code. You define your architecture and software setup once,…
April 22, 2019
The Internet of Things, or IoT, is what allows us to take the power of computing beyond desktops, servers, and…
April 10, 2019
Back when I first became a programmer, it was a common practice to include database credentials right in the code…
March 29, 2019
This integration allows Terraform users to leverage Conjur’s advanced non-human access control capabilities such as robust secrets management, tamper resistant...
March 27, 2019
Scrum Standups: A Refresher Engineers working in teams that use Scrum should be familiar with the format of a daily...
February 28, 2019
Kubernetes permissions are built with role-based access controls (RBAC), which open up potential risks and need to be carefully controlled. ...
February 27, 2019
Over the past few years, whether you’re a developer, a system administrator, or a security professional, your world has changed a...
January 24, 2019
I had the pleasure of recently eating dinner at Kitchen Market, a contemporary fusion restaurant in Tel Aviv’s port Namal....
December 19, 2018
I was really excited to attend the Cloud Native Computing Foundation’s (CNCF) KubeCon + CloudNativeCon Kubernetes conference in Seattle. I...
December 17, 2018
LA parking signs A Warning Sign Los Angeles is famous for its complicated parking signs: Sunny totems of rules and...
December 7, 2018
The last decade has been an exciting time for the tech industry, with the advent of collaborative business practices like...
November 28, 2018
Ansible is an excellent tool for automating procedures across multiple machines. To do this, it uses multiple SSH connections to…
November 14, 2018
At CyberArk, code reviews are a part of daily life. Getting input from peers is essential to maintaining high code...
October 19, 2018
If your organization has been successful since before containers were a thing, then you probably already have a mix of...
October 3, 2018
CyberArk is incredibly pleased to announce the beta release of a new open source project, Secretless Broker. Secretless Broker makes...
September 20, 2018
CyberArk Conjur Open Source is now available as a Kubernetes application in the Google Cloud Platform (GCP) Marketplace. The new...
September 19, 2018
I’ve recently been working with secrets.yml files that point to different secrets for different environments, and I wanted to share...
September 10, 2018
The Secret Zero Problem I have talked to a number of security conscious professionals across a wide range of...
September 6, 2018
With the rise of Go, cross-compiling platform agnostic code has become more accessible than ever. Building a Windows binary of...
August 29, 2018
Fast software is satisfying to use, less costly to operate, and responds better to scale. Yet trying to improve the...
August 24, 2018
Buzz about Kubernetes is everywhere, and plenty of large organizations have adopted it. But what about smaller organizations? Is the...
July 26, 2018
If you think you're hearing about a company getting hacked almost every day, that's because you're correct: there were over...
July 24, 2018
Pulling at a loose thread One day I noticed an inconsistency as I was joining together lists of words. Consider...
June 29, 2018
“The great thing about software and servers is they always work as expected.” – Said no one, ever When…
June 26, 2018
Containerization has taken the technology world by storm. Docker emerged as the de-facto leader in the base technology making it all possible. Because containerization necessitates consistency throughout your infrastructure, even...
June 18, 2018
Challenge Conjur is built to allow you to control access to your critical systems. This makes Conjur a critical security...
May 22, 2018
One of the biggest challenges in containerized environments like Kubernetes is the secure distribution of credentials and other secrets needed...
May 16, 2018
Martin Fowler’s popular article on microservices contains this advice: Going directly to a microservices architecture is risky, so consider building...
May 4, 2018
This is the sixth and final blog post in a series discussing how high-performing DevOps teams build secure systems at scale….
May 2, 2018
In the dynamic world of containers there are challenges around providing secrets needed for a containerized workflow without hurting the…
April 27, 2018
The Conjur team spends a lot of time thinking about security policies. We create them regularly for our own operations…
April 25, 2018
This is the fifth blog post in a series discussing how high-performing DevOps teams build secure systems at scale. If…
April 16, 2018
Configuring servers by hand is a costly and error-prone endeavor that increases in difficulty as the number of servers…
April 4, 2018
At their San Francisco Summit today, Amazon released AWS Secrets Manager. It’s a native AWS service that simplifies the...
March 21, 2018
If this article is the first time you’re hearing about CyberArk Conjur, you’ll probably want to read some of…
March 21, 2018
How would you assess your team’s current cyber security level within your organization? If you’re like most, your team...
March 14, 2018
Managing the SSH keys Ansible uses to connect to remote machines can be challenging. Placing keys on the Ansible…
March 6, 2018
This is the fourth blog post in a series discussing how high-performing DevOps teams build secure systems at scale….
March 2, 2018
We are excited to announce the release of a new integration between Conjur and Cloud Foundry (CF). Cloud Foundry users...
February 26, 2018
This is the first blog post in a series focusing on DevOps security workflows with Conjur. Check back for…
February 23, 2018
What happened at Tesla? Tesla’s Amazon cloud accounts were breached recently by hackers who put the stolen servers to...
February 16, 2018
Dr. Frankenstein’s monster is one of the most hated and misunderstood monsters of all time. Frankenstein brought his creation…
February 5, 2018
This is the third blog post in a series discussing how high-performing DevOps teams build secure systems at scale….
January 29, 2018
This is the second blog post in a series discussing how high-performing DevOps teams build secure systems at scale….
January 26, 2018
Even if you’ve never heard of Jenkins, you might be benefiting from it already: many companies and open source...
December 19, 2017
This is the first installment in a series of blog posts on this topic. Years have passed since the software…
December 19, 2017
Our Jenkins cluster had become a paralyzing mass of jobs, executor dependencies, and general complexity, not what you want...
December 18, 2017
We know it takes a lot to get a secure cloud automation project into production. Every day we are helping...