November 20, 2025
From Hardcoded to Secure: Managing Secrets in Java Apps with External Secrets Operator
By awiskar acharya | | 0 Comments |
As Java developers, we've all been there: you need to…
SPIFFE Federation in Java: Secure Service Identity Across Trust Domains
By awiskar acharya | | 0 Comments |
SPIFFE (Secure Production Identity Framework For Everyone) and its companion…
Kubernetes Security Testing: Implementing Kubernetes Goat Scenarios in Java
By awiskar acharya | | 0 Comments |
Article Kubernetes Goat is a deliberately vulnerable Kubernetes cluster designed…
In-Toto for Attestations in Java: Comprehensive Software Supply Chain Security
By awiskar acharya | | 0 Comments |
In-Toto is a framework that protects software supply chain integrity…
Secure Your Supply Chain: Tekton Chains Provenance for Java Applications
By awiskar acharya | | 0 Comments |
Introduction In today's software landscape, securing the software supply chain…
Securing the Software Supply Chain: Signing Java Artifacts with Notary v2
By awiskar acharya | | 0 Comments |
Article In today's software landscape, securing the software supply chain…
Building Trust from Source to Artifact: A Java Developer’s Guide to SLSA Compliance
By awiskar acharya | | 0 Comments |
In today's software supply chain landscape, simply writing secure code…
From Source to Artifact: Securing the Modern Java Supply Chain
By awiskar acharya | | 0 Comments |
As Java developers, we've moved far beyond writing code in…
KodeKloud for Java Learning
By awiskar acharya | | 0 Comments |
Introduction KodeKloud is a comprehensive learning platform for DevOps, cloud…
Telepresence for Remote Dev in Java: Bridging Local and Kubernetes Environments
By awiskar acharya | | 0 Comments |
Telepresence is a Cloud Native Computing Foundation (CNCF) project that…
1 4 5 6 7 8 11

Macro Nepal Helper