Blog
Secure Secret Injection: Using AWS Secrets Manager CSI Driver with Java Applications
By awiskar acharya | | 0 Comments |
Article In Java applications, managing sensitive data like database passwords,…
Securing Kubernetes Secrets: A Java Developer’s Guide to Sealed Secrets and Kubeseal
By awiskar acharya | | 0 Comments |
As Java developers deploying to Kubernetes, we face a common…
SPIRE for Workload Identity in Java
By awiskar acharya | | 0 Comments |
Maven Dependencies SPIRE Configuration Examples SPIRE Agent Configuration (agent.conf) Kubernetes…
From Hardcoded to Secure: Managing Secrets in Java Apps with External Secrets Operator
By awiskar acharya | | 0 Comments |
As Java developers, we've all been there: you need to…
SPIFFE Federation in Java: Secure Service Identity Across Trust Domains
By awiskar acharya | | 0 Comments |
SPIFFE (Secure Production Identity Framework For Everyone) and its companion…
Kubernetes Security Testing: Implementing Kubernetes Goat Scenarios in Java
By awiskar acharya | | 0 Comments |
Article Kubernetes Goat is a deliberately vulnerable Kubernetes cluster designed…
In-Toto for Attestations in Java: Comprehensive Software Supply Chain Security
By awiskar acharya | | 0 Comments |
In-Toto is a framework that protects software supply chain integrity…
Secure Your Supply Chain: Tekton Chains Provenance for Java Applications
By awiskar acharya | | 0 Comments |
Introduction In today's software landscape, securing the software supply chain…
Securing the Software Supply Chain: Signing Java Artifacts with Notary v2
By awiskar acharya | | 0 Comments |
Article In today's software landscape, securing the software supply chain…
Building Trust from Source to Artifact: A Java Developer’s Guide to SLSA Compliance
By awiskar acharya | | 0 Comments |
In today's software supply chain landscape, simply writing secure code…
1 128 129 130 131 132 292

Macro Nepal Helper