Conjur Open Source is a robust secrets management tool to manage, audit, and control access across multiple platforms. Let’s explore…
Category: Open Source
Tutorial: Kubernetes Vulnerability Scanning & Testing With Open Source
Mainstream technology enterprises widely use Kubernetes. It’s an extendable, lightweight, open-source container orchestration platform. This popular platform has an ever-expanding…
New Red Hat OpenShift Secrets Management Operator for The Conjur (Follower)
Red Hat OpenShift is one of the most popular and powerful enterprise container orchestration platforms. All container orchestration solutions let…
Low-Code Secrets Management For Beginners
In recent years, there is a trend toward so-called low-code and no-code platforms. While no-code platforms often appeal to businesses…
Remove Secrets from your Codebase
With technology becoming a central part of our daily lives, we need to keep information safe from an equally rapidly…
Introducing the Conjur OpenAPI Description
The Conjur REST API is now available as an open-source OpenAPI definition. This effort creates new avenues for API exploration,…
New Open Source Project: Privileged Access Management Server Health Check
The recent SolarWinds breach prompted many organizations to take a hard look at their current cybersecurity practices, and get back…
Behind the Curtain of Conjur Open Source Suite (OSS) Releases
Since our first release of the Conjur Open Source Suite (OSS) aimed at helping development teams make the most of our secrets management…
Securing Secrets in Kubernetes
The Challenge Secrets – or privileged credentials that act as “keys”– are essential in Kubernetes environments. Kubernetes pods and their…
Security Automation: Best Practices for Secrets Management in a Configuration-as-Code Environment
Software and infrastructure architecture are quickly evolving into cloud environments. With this migration, Infrastructure as Code (IaC) is melding with…
CNCF: Supporting a Strong, Secure OSS Cloud Native Ecosystem
For many organizations, open source software (OSS) has become a must-have tool in their digital transformation toolboxes—what’s more, it’s fundamentally transforming the way software is…
AWS IAM Authenticator Tutorial For Conjur Open Source
Applications often need to hold secrets. Connection strings, passwords, certificates, and other credentials are among the information applications may need…
All the World’s A Stage, and We Are Merely Software Engineers
Lessons from the Stage Software Development isn’t all drama, but I learned a lot from my time volunteering with various…
Top 4 Open Source Tools for Observability of Containers and Microservices
Visibility is a key requirement when working with containers and microservices, especially in complex environments where it’s hard to keep…
How to Scan GitHub Repositories for Secrets & Credentials with Open Source
Some GitHub repositories don’t just contain code – they contain passwords, API tokens, and credentials. The worst part? These are…
New & Improved Conjur Open Source Community
I would like to take a moment to talk about the exciting work our team has done to improve the…
Enhance your product’s supportability with a logs-first approach
When you’re building an app that will be deployed in someone else’s environment, building it so that it’s easy to…
Slack vs Discourse: Choosing the Right Community Platform
As online communities grow globally, community platforms like Slack and Discourse play a critical role in managing and improving the…
Tutorial: How I Secured Third-party Mongo API Secrets in My Node.js App Across the Cloud
Developing modern web applications in the cloud nowadays is more streamlined than ever. This is true because many external vendors…
An Introduction to Creating & Organizing Your First Public Key Store for Microservices With Secrets Management
Microservices are taking the world by storm, and the movement isn’t showing signs of slowing down any time soon. The…
Building a Comprehensive Monitoring Strategy That Includes Secrets Management
Over the past decade, software development and information technology operations have become more integrated, spawning a new approach, commonly called…
Four Ways to Keep Kubernetes’ Secrets Secret
We have talked a lot about the speed at which DevOps innovation has moved and how security has consistently struggled…
Stop Bashing Bash
Admit it, you still write bash. Maybe a lot of bash. We all think we can avoid it, but we…
Let’s Open up the Discussion
You are reading this on Conjur.org because you love DevOps, open source, Conjur, or maybe it’s the sound of my…