In this article, we explore everything you need to know about Kubernetes Secrets and how to manage sensitive information in your Kubernetes clusters. You'll learn how to create different types of secrets, understand the various creation methods using kubectl, and discover best practices for using secrets in your applications. By the end of this article, you'll have a comprehensive understanding of how to securely handle credentials, API keys, certificates, and other sensitive data within your
Posts by Category:
- Security
- Access
- Auditing
- DevOps
- Policy
- Privileged Access Management
- Zero Trust
- SOC 2
- Compliance
- Authentication
- Databases
- Identity and Access Management
- Compare
- Team
- Product
- Integrations
- AWS
- Kubernetes
- Productivity
- Podcasts
- Engineering
- SSH
- HIPAA
- ISO 27001
- Dynamic Access Management
- Observability
- Role-Based Access Control
- Secure Access Service Edge
- Webinars
- Events
- NIST
- Onboarding
- Passwordless
- Offsites
- Platform
- PCI
Up to 80% of data breaches in the U.S. start with unauthorized access. Without insights into who’s accessing your database, their login privileges, and the duration of each session, it can be difficult to prevent potential security threats. Fortunately, PostgreSQL is a powerful open-source relational database management system you can use to manage access control. Known for its advanced support, complex queries, and rich features, PostgreSQL can list users in your database for security audits,
As a system administrator, a time will come when you’ll need to delete or remove users in your organization’s Linux system. It could be due to security reasons, routine account management, or organizational changes that require you to remove inactive accounts or offboard employees. Whatever the reason, it's important to do this properly to avoid problems like broken processes, orphaned files, and security vulnerabilities.
This guide breaks down the top cloud database solutions reshaping how organizations store, manage, and scale data. From relational databases to NoSQL options, we’ll cover what matters most when choosing the right solution for your needs. By the end, you’ll understand how modern cloud databases drive scalability and performance—and which one is the best fit for your organization.
Security best practices recommend that you manage privileged access for Linux distributions like Ubuntu, just as with any other operating system. That’s why most Linux systems have the root user or superuser and regular users. At some point, you may need to elevate a regular user’s privileges so they can execute root-level tasks, such as modifying system configurations and settings. In this case, leveraging sudo can be helpful.
The latest updates in NIST Special Publication shift focus from complexity to usability. Key changes include: 1. Prioritizing password length over complexity. 2. Mandating compromised credential screening. 3. Encouraging passwordless authentication methods. 4. Eliminating forced password resets unless compromise is suspected.
StrongDM fixes what legacy PAM vendors get wrong. Before you start swiping for a better solution, see why security teams are breaking up with their old PAM—and how StrongDM is helping them fall in love with security again.
Both StrongDM and CyberArk are privileged access management solutions to provide secure access to backend infrastructure. While there are many similarities between the two solutions, there are also some key differences.
At first glance, legacy PAM tools might seem like a safe bet. They’re familiar and established, and they’ve been getting you from here to there for years. But take a look under the hood, and you’ll see that they’re quietly draining your resources.
Managing secure access to infrastructure shouldn’t be a headache—but for most organizations, it is. That’s where StrongDM comes in. We replace clunky, outdated access solutions with a frictionless, Zero Trust approach that actually makes life easier for IT, DevOps, and security teams. In this FAQ blog post, we’re cutting through the noise to answer the most common questions about StrongDM—what it is, how it works, and why it’s the go-to platform for secure, scalable access.
When working with or administering a database, you'll need to delete, remove, or drop users at some point. This might seem like a routine task, but dropping unnecessary or old users is crucial for maintaining database security. This helps remove access points for malicious actors — both in-house and external — so only authorized individuals can perform operations on it.
As enterprises increasingly migrate workloads to the cloud, security strategies must adapt to meet evolving threats. Zero Trust, emphasizing identity verification and least privilege access, has become a critical framework for securing cloud environments. StrongDM’s recent survey of 600 cybersecurity professionals sheds light on the progress and challenges organizations face in adopting Zero Trust for the cloud.