Skip to content
Company name
  • Solutions
    • DevOps Security
    • Secrets Management
    • Role Based Access Control
    • Secretless Applications
    • Remove Secrets from Code
  • Use Cases
    • Secure CI/CD Pipelines
    • Kubernetes Security
    • Container Security
    • Application Security
    • Security Automation
  • Learn
    • Quick Start
      • Setup a Conjur OSS Environment
      • Define Policy
      • Store a Secret
      • Run the Demo App
    • Interactive
      • Secure Ansible Automation
      • Secure CI/CD Pipelines
      • Secure Kubernetes Secrets
    • Tutorials
      • Enrolling an Application
      • Delegating Policy Management
      • Ruby API
      • Securing Jenkins
      • Cloud Foundry Integration
    • Why Conjur
  • API
    • REST API
    • CLI
    • SDK
    • Inject Secrets
    • Secretless Broker
  • Docs
  • Blog
  • icon-discourse
  • Solutions
    • DevOps Security
    • Secrets Management
    • Role Based Access Control
    • Secretless Applications
    • Remove Secrets from Code
  • Use Cases
    • Secure CI/CD Pipelines
    • Kubernetes Security
    • Container Security
    • Application Security
    • Security Automation
  • Learn
    • Quick Start
    • Interactive
    • Tutorials
    • Why Conjur
  • API
    • REST API
    • CLI
    • SDK
    • Inject Secrets
    • Secretless Broker
  • Docs
  • Blog
  • icon-discourse

About: jwalsh

Profile
John Walsh has served the realm as a lord security developer, product manager and open source community manager for more than 15 years, working on cybersecurity products such as Conjur, LDAP, Firewall, JAVA Cyptography, SSH, and PrivX. He has a wife, two kids, and a small patch of land in the greater Boston area, which makes him ineligible to take the black and join the Knight’s Watch, but he’s still an experienced cybersecurity professional and developer.

Posts by jwalsh:

  • ChatGPT Is Here: How to Use AI to Write Code and Best Practices for Security Posted on March 20, 2023 by John Walsh in Uncategorized
  • The Sword in the Darkness, the Watcher on the Wall Posted on March 2, 2023 (March 3, 2023) by John Walsh in Agile&DevOps&Secrets&Security&Uncategorized
  • Secure CI/CD Pipelines: Best Practices for Managing CI/CD Secrets Posted on February 15, 2023 (February 15, 2023) by John Walsh in CI/CD Pipeline Security&Secrets Management
  • Kubernetes Security: Best Practices for Kubernetes Secrets Management Posted on February 2, 2023 (February 9, 2023) by John Walsh in Kubernetes&Kubernetes Security&Secrets Management
  • Security Automation with Red Hat Ansible Tower Introduction Posted on July 20, 2022 (July 28, 2022) by John Walsh in Ansible&Application Security&Automation Security&Secrets&Secrets Management&Uncategorized
  • Setting up Conjur on OpenShift Posted on April 18, 2022 (April 20, 2022) by John Walsh in Docker&Kubernetes&Secrets Management&Security&Uncategorized
  • New Red Hat OpenShift Secrets Management Operator for The Conjur (Follower) Posted on January 31, 2022 (March 31, 2022) by John Walsh in Kubernetes&Open Source&Secrets Management
  • Low-Code Secrets Management For Beginners Posted on January 26, 2022 (February 19, 2022) by John Walsh in Open Source&Secrets Management&Security&Uncategorized
  • Why Machine Identity is as Important as User Identity to Infrastructure Security Posted on October 28, 2021 (November 2, 2021) by John Walsh in Secrets Management&Security&Uncategorized
  • Three Steps to Avoiding the Secret Zero Trap Posted on October 21, 2021 (October 28, 2021) by John Walsh in Application Security&Secrets&Secrets Management&Security&Uncategorized
  • Keeping Secrets Secure on Kubernetes Posted on September 16, 2021 (September 22, 2021) by John Walsh in Kubernetes&Kubernetes Security&Secrets&Secrets Management&Security&Uncategorized
  • Why You Need Secrets Management in Your Jenkins Pipeline Posted on September 10, 2021 (September 27, 2021) by John Walsh in CI/CD Pipeline Security&Secrets&Secrets Management&Security&Uncategorized
  • Kubernetes secrets management: Build secure apps faster without secrets Posted on August 27, 2021 (September 22, 2021) by John Walsh in Application Security&Kubernetes&Kubernetes Security&REST API&Secretless Broker&Secrets Management&SSH&Uncategorized
  • CIAM vs IAM: What is the Difference Posted on July 21, 2021 (July 23, 2021) by John Walsh in Security&Uncategorized
  • DevOps Security: Cloud Secrets Management, from Multi-Cloud to Cloud Agnostic Environments Posted on May 25, 2021 (June 25, 2021) by John Walsh in CI/CD Pipeline Security&DevOps&Secrets Management&Security&Uncategorized
  • Learning Secrets Management With Hands-on Interactive Tutorials Posted on May 21, 2021 (June 25, 2021) by John Walsh in Ansible&CI/CD Pipeline Security&DevOps&Kubernetes Security&Secrets Management
  • Essentials to Securing Kubernetes Secrets with Secrets Management Posted on April 4, 2021 (April 9, 2021) by John Walsh in Kubernetes&Kubernetes Security&Secrets Management
  • Securing OpenShift Secrets Posted on February 22, 2021 (March 24, 2021) by John Walsh in Application Security&Container Security&Kubernetes Security&Secrets Management
  • Secret Zero: Eliminating the Ultimate Secret Posted on January 29, 2021 (April 28, 2021) by John Walsh in Kubernetes&Secrets&Secrets Management
  • Container Security: Best Practices for Secrets Management in Containerized Environments Posted on November 30, 2020 (December 19, 2020) by John Walsh in Container Security
  • Application Security: Best Practices for Secrets Management to Protect Applications Posted on November 29, 2020 (December 19, 2020) by John Walsh in Application Security&Secrets Management
  • Leverage Secrets Management for Effective On-Call Support Posted on September 25, 2020 (March 2, 2021) by John Walsh in Secrets Management
  • CNCF: Supporting a Strong, Secure OSS Cloud Native Ecosystem  Posted on August 12, 2020 (July 7, 2021) by John Walsh in CI/CD Pipeline Security&Cloud&CNCF&Community&Container Security&Open Source
  • Secrets Management Overview For Developers & DevOps Posted on June 18, 2020 by John Walsh in Development&Secrets&Secrets Management&Security
  • New & Improved Conjur Open Source Community Posted on March 30, 2020 (March 31, 2022) by John Walsh in Community&Open Source
  • Slack vs Discourse: Choosing the Right Community Platform Posted on January 31, 2020 by John Walsh in Community&Open Source
  • KubeCon + CloudNativeCon San Diego Wrap up Posted on November 26, 2019 by John Walsh in Uncategorized
  • Four Ways to Keep Kubernetes’ Secrets Secret Posted on November 18, 2019 (November 26, 2019) by John Walsh in Community&DevOps&Kubernetes&Open Source&Secrets&Secrets Management&Security
  • Let’s Open up the Discussion Posted on October 24, 2019 by John Walsh in Community&Languages&Open Source
  • Getting off The Jenkins Island Posted on August 29, 2019 (November 6, 2019) by John Walsh in DevOps&Secrets&Security
  • Conjur Open Source is Going Secretless Posted on July 17, 2019 (November 6, 2019) by John Walsh in Uncategorized
  • KubeCon 2019: The Conference for the Sagrada Familia of Software Posted on June 7, 2019 (November 12, 2019) by John Walsh in DevOps&Secrets&Security
  • Open Source Software isn’t Really Free, but it’s the Future of Business Posted on May 29, 2019 (November 6, 2019) by John Walsh in Uncategorized
  • Conjur Open Source Now Natively Integrates with Terraform Posted on March 29, 2019 (November 6, 2019) by John Walsh in DevOps&Secrets&Security&Uncategorized
  • Introducing KubiScan Posted on February 28, 2019 (May 16, 2019) by John Walsh in Uncategorized
  • CyberArk CNCF KubeCon 2018 Wrap up Posted on December 19, 2018 (May 16, 2019) by John Walsh in DevOps&Secrets&Security&Uncategorized
  • Introducing the Secretless Broker Open Source Beta Posted on October 3, 2018 (May 16, 2019) by John Walsh in DevOps&Secrets&Security&Uncategorized
  • “One-Click” K8s Authentication & Secrets Management on GCP Posted on September 20, 2018 (November 6, 2019) by John Walsh in DevOps&Secrets&Security&Uncategorized
  • Don’t Get Pwned by Secret Zero Posted on September 10, 2018 (November 6, 2019) by John Walsh in DevOps&Secrets&Security
  • Cloud Foundry Integration Available in GitHub Posted on March 2, 2018 (November 6, 2019) by John Walsh in Uncategorized
  • DevSecOps is an Abomination! Posted on February 16, 2018 (November 12, 2019) by John Walsh in Uncategorized

JOIN OUR GROWING COMMUNITY

  • Solutions
    • DevOps Security
    • Secrets Management
    • Role Based Access Control
    • Secretless Applications
    • Remove Secrets from Code
  • Use Cases
    • Secure CI/CD Pipelines
    • Kubernetes Security
    • Container Security
    • Application Security
    • Security Automation
  • LEARN
    • Secure Ansible Automation
    • Secure Jenkins CI/CD Pipelines
    • Secure Kubernetes Secrets
    • Quick Start
    • Why Conjur
  • CYBERARK
    • About
    • Careers
    • Enterprise
FOLLOW US
Asset 33 Asset 34 Asset 28

Copyright © 2023 CyberArk Software Ltd. All rights reserved. Terms and Conditions | Privacy Policy |