Third and final installment on secret management. In this article I give an overview of all the solutions I found that met my criteria.
Secrets Management, a key less edition
This is a second installment on tools that will help you manage your secrets. This time I’m diving into a solution called AKEYLESS which looks like a great option for those needing a more fully fledged Secret and key management solution.
Emailing from python3
In this article I deviate again from cybersecurity to continue with topic of how to send notifications from python, this time by sending fully functional email
Docker and Doppler
My latest project has been to get more comfortable with Docker, how it works, how to set it up, etc. During that I started learning how to integrate Doppler into Docker. This article explains my findings.
Secrets Management
In this article I talk about benefits of managing all the secrets you use in your dev efforts and how to do it efficiently and securely. I also provide a sample script to play with.
Cybersecurity philosophy
I am not planning on waxing philosophy in this post, but I do want to discuss ideology or mindset of a successful cybersecurity professional. In my Vulnerability Management post I went over how to structure your vulnerability management program. Here…
Zero Trust
This blog describes what zero trust is and what you need to think about if you are wanting to go that route.
Vulnerability Management: A how to
In this post we explain what goes into a good vulnerability management program, to keep it blog length it is rather high level.
Encryption and the CIA Triad
Explanation of what encryption as well as the CIA triad is, in common every day English.
WHAT IS RANSOMWARE
Ransomware is type of self-propagating malware that encrypts your files so that you cannot read or use them until you pay a ransom. Yeah, I know, I can feel how you are rolling your eyes at that unhelpful explanation full…