Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Securing your CI/CD Pipelines with GitHub Actions: DevSecOps in Action

When people talk about securing software, they typically refer to two distinct aspects. The code itself, or the servers it runs on. That makes sense. Those are the most visible parts. But what actually holds everything together isn’t either of those. It’s the pipeline in between the system that moves code from an idea in a developer’s head to something running in production. CI/CD pipeline can be easy to overlook because it often feels invisible.

Kubernetes Tricks & Treats: Security and Scale without the Scary Stuff

Kubernetes is powerful — but let’s be honest, managing access and identities across users, clusters, kubectl sessions, RBAC rules, CI/CD pipelines, and AI agents can feel like wandering through a corn maze in the dark. Static kubeconfigs, sprawling IAM roles, and long-lived credentials are the cobwebs and skeletons cluttering your path to secure, scalable infrastructure.

Overview of Teleport Zero Trust Access: Secure Infrastructure Without VPNs

In this video, we explore how Teleport Zero Trust Access replaces outdated VPNs and static credentials with a modern, identity-based approach to secure infrastructure access. See how Teleport unifies access across servers, Kubernetes, databases, and cloud environments, all powered by short-lived, certificate-based credentials that eliminate passwords, reduce risk, and streamline engineering workflows.

Ultimate Guide to Open Source Security: Risks, Attacks & Defenses

Unlike closed-source code or proprietary applications, open source software (OSS) exposes its source code, allowing anyone to view, modify, or contribute to it. This transparency delivers both opportunities and unique threats; developer communities can uncover flaws faster, but attackers can also examine code for weaknesses and even easily leverage known reported open source vulnerabilities.

Zero Standing Privileges vs Credential Vaulting

Zero Standing Privileges (ZSP), where no user or system account has access unless there is a task being performed, is a milestone goal for most security teams. No always-on accounts, no secrets sitting around “just in case,” and nothing waiting to be misused. For a long time, privileged access management (PAM) has meant using credential vaults to store, rotate, and protect privileged credentials like administrative passwords, SSH keys, and API tokens.

BygoneSSL and the certificate that wouldn't die

Turns out the scariest thing about SSL certificates isn’t when they expire. It’s when they don’t. I wrote about the CA/Browser fight that led to the 47-day certificate mandate. CAs crying about lost revenue, browsers flexing their root program authority, enterprises stuck in the middle. But nobody talks about the security research that started it all: BygoneSSL at DEFCON 2018. Two researchers mining Certificate Transparency logs found something surprising.