Identity and Access Management
Five Great DevOps Job Opportunities
Looking for a great new DevOps job? Check out these available opportunities at Cognizant, IBM, Workday and more! ...
Venafi Adds Ability to Prevent Unauthorized Code From Running
Venafi added an ability to prevent unauthorized code from running in IT environments that make use of its machine identity management platform ...
Sonar Adds Secrets Detection to Code Analysis Portfolio
Sonar has added a secrets detection capability to its portfolio of tools for analyzing code and DevOps workflows ...
RBAC For Your CI/CD Pipeline: Why and How
By implementing RBAC in your CI/CD pipeline, you can help ensure secure and efficient operations ...
Navigating Passkeys: Challenges, Pitfalls and Considerations for Developers
While passkeys can dramatically improve the security and UX of authenticating users to applications, there’s a lot that still rests on the shoulders of developers ...
Who Should Have Access to Production?
In a perfect world, no one would have access to production, as that’s the safest way to make sure there won’t be any issues ...
Policy-Based Governance: Modernizing Authorization for the Enterprise
Change of control and management of access in the privileged environment requires a new approach to the solutions we use for privileged access governance ...
Pulumi Previews Tool to Integrate Secrets and Infrastructure Management
Pulumi previewed a tool that enables DevOps teams to unify environments, secrets and configuration (ESC) management ...
HashiCorp Acquires BluBracket to Extend Secrets Management Reach
HashiCorp this week acquired BluBracket to add a set of static secrets discovery tools to its portfolio ...
AWS Identity and Access Management (IAM) Roles and How to use Them
Amazon Web Services relies on the AWS IAM service to govern who is authenticated and authorized to use AWS resources. It plays a hugely significant role in AWS security–and so do its ...
FIDO/WebAuthn Passkeys is Inevitable: Get on the Train ¦ IBM CEO Hates WFH
In this week’s #TheLongView: The Passkeys authentication standard gets a huge boost, and Arvind Krishna wants workers back in the office ...
Watching the Watchers: Solving the Problem of Meta-Permissions
The move to the cloud and microservices has introduced new challenges in managing permissions. Software has been broken down into small, independently-deployable microservices, each with its own unique set of permissions. These ...