Ansible provides powerful orchestration capabilities to launch and manage machines in the cloud. Conjur provides advanced identity management and access control capabilities to help secure that infrastructure.
Docker has taken a welcome step toward making security easier for containerized applications. In Docker 1.12, made generally available last Friday, Docker, has been enhanced with “mutually authenticated transport layer security (TLS),
Join us for a live webcast Wednesday June 29 at 2PM eastern on securing your DevOps pipeline.
Native .NET Libraries and Windows Remote Desktop Support Spans Microsoft Workloads in Cloud, Hybrid and PaaS Environments
Our VP, Josh Bregman, was lucky enough to attend and speak at Puppet Camps Dallas. You might be wondering, what exactly are Puppet Camps? Puppet Camps are one-day events where you can watch presentations delivered by prominent members of the community as well as connect with fellow Puppet users. We recently spoke with Grace Stillar, Events Marketing Coordinator at Puppet Labs. To learn more about Puppet Camps, check out our conversation with her.
Today I'd like to share how we scale our build infrastructure at Conjur. We build and test the software we release on a Jenkins cluster running in AWS. Right now, we have nearly 100 different jobs defined and several different pipelines. We've been able to cut down on job maintenance by defining jobs in the Jenkins Job DSL (all our job definitions are open source here). But wasted time adds up if you can't find a way to automatically launch and configure executor nodes as needed. In this post I'll describe in detail how we scale Jenkins executors safely and securely.
The Cloud Security Alliance recently released the Treacherous 12, the top cloud computing threats of 2016. Their goal in creating this piece is to help enterprises mitigate risk and come up with security solutions that defend against the most pressing security issues of the coming months. Although security experts make warning against these risks, few companies take actual steps to avoid them, and security breaches occur as a result. Therefore, it is not only important to craft a security plan, but also to follow it, keeping the issues of automation, access management, and secrets rotation in mind.
Here at Conjur, we are big fans of Puppet. Together, Puppet and Conjur help organizations automate and go fast while staying in control with a clear audit trail.
Our love of Puppet explains why we are super excited to attend Puppet Camps Dallas on March 22. Puppet Camps are one-day events during which you can watch presentations delivered by prominent members of the community as well as connect with other users in the area.
In honor of Super Tuesday, we thought it would be a good idea to to take a look at the election process thus far and see what today's presidential candidates can teach us about communicating with a team. Whether you're a conservative, liberal, or somewhere in between there are some clear takeways you can garner from these
Conjur and SSH will showcase a combined solution that allows customers to extend access management visibility and control beyond the datacenter
Going to RSA? While you're navigating your way around the Moscone Center, it can be difficult to figure out where to go or which sessions you should attend. With hundreds of interesting and informative sessions, conducted by industry experts, how can you choose? Although you'll get some fantastic takeaways from any session you select, we’ve picked 7 sessions we think will be particularly interesting.
We are always trying to get better at our jobs. Although we can't put a price on the real, hands on experience of practice, implementation, and and conversations, sometimes we need to rely on additional perspectives to paint a more complete picture.
Many experts in the IT field believe that the battle inside the enterprise between developers, security, and compliance officers will de-escalate. However, at Conjur, we believe this issue is a complex one and is beyond the solution of simply finding common ground. The challenge is discovering the balance between accountability and agility, and the security tools that can enable and sustain that balance.
We've already discussed Experian's prediction that healthcare would be a major target for hackers in 2016. In light of recent events, it seems their predictions were correct. Hollywood Presbyterian Medical Center in southern California is the latest organization to fall victim to hackers.
Short on time but still want to stay in the know? We get it. Finding helpful and targeted content isn't always easy. It's useful to have a few key resources we can count on for the latest news, productive conversations, and valuable advice. As a security architect, you want to read content that addresses your chief concerns and keeps you up to date with the current industry threats and trends.
Getting developers on board with new security initiatives can be tricky. Developers want to innovate and since their performance is based on their productivity, security is often viewed as a hindrance that cripples their ability to excel. As the technical landscape has become increasingly more aggressive, and enterprises need to keep up with their competition, slowing down isn’t an option.