passwords, passkeys, 1Password passwordless credential stuffing Password We Still Use Bad Passwords

1Password Leverages SSO Service to Better Protect Secrets

1Password announced today general availability of a single sign-on (SSO) capability that makes sure secrets are kept secure by leveraging keys that are stored on an end user’s device. The Unlock with ...
Security Boulevard
GitHub Secret Scanning is now Free (as in Beer)

GitHub Secret Scanning is now Free (as in Beer)

Microsoft’s GitHub source control service will help stop devs accidentally embedding secrets in public code repositories. It’s a big problem ...
Security Boulevard
digital trust experience GitGuardian reports leaked secrets

GitHub 2FA Push is Positive, But There’s More to Be Done

All developers contributing code on GitHub will be required to enable at least one form of two-factor authentication (2FA) by the end of next year, with the site well into its efforts ...
Security Boulevard
panasonic nvidia ransomware XDR ransom ProxyLogon Black Kingdom Egregor

Nvidia Data, Credentials Stolen in Cyberattack 

Chipmaker Nvidia is the latest large enterprise to fall victim to a cybersecurity breach, one which resulted in the theft of some employee credentials as well as some of the company’s proprietary ...
Security Boulevard
converged, identity Permiso PAM, cybersecurity, credentials, identity, security, credentials authorization PAM governance digital identity IAM authorization

Manage Secrets With Invisible PAM

There’s a security innovation paradox in DevOps environments, according to new research from ThycoticCentrify and Forrester.  Organizations want developers to innovate faster without sacrificing security in the process. “As security leaders seek ...
Security Boulevard
network BlackBerry digital workplace SASE network Palo Alto Networks HashiCorp

HashiCorp Launches Open Source Identity Framework

HashiCorp, at its HashiConf Digital conference today, announced an open source Boundary project that will enable users to remotely access systems regardless of location based on their specific identity. At the same ...
Security Boulevard

Can Kubernetes Keep a Secret?

Every application uses secrets to function. These secrets include usernames and passwords, API keys, and other similar private keys. Applications running inside Kubernetes are no exception. Unfortunately, Kubernetes has a reputation for ...
Okta F5 Alkira zero-trust Secure Cloud AccessTeleport cloud incident response automation cloud security cloud data protection Oracle cloud security Bridgecrew misconfigurations Palo Alto Networks public cloud

Managing Security and Privacy in the Public Cloud

As with any enterprise technology, there are benefits and challenges when creating IT environments in the public cloud. The benefits include cost savings and the ability to easily scale up and down ...
Security Boulevard
A Deep Dive Into Secrets Management

A Deep Dive Into Secrets Management

There’s a lot to think about when it comes to working with containers, Kubernetes, and secrets. You have to employ and communicate best practices around identity and access management in addition to ...