WTF is Cloud Native Data Security?

    If you’ve got something valuable, you can pretty much guarantee that someone will be looking to carry out unauthorised activities around it, and cloud workloads are exposed to just as many security ri...

    WTF…Can You Do about Software Supply Chain Attacks without Killing Open Source?

    When the White House says something is a threat, many people’s first reaction is to work out precisely what it is that the president and his aides are really trying to distract us from.

    WTF Is Our Most Critical Cybersecurity Resource? And How Can We Preserve It?

    A few years ago, I managed a user-experience designer who excelled at design but was wholly unfamiliar with the user end of cybersecurity software. It mystified him why I would overrule a straightforw...

    Who Is Responsible for Cybersecurity?

    Last year was a lot of things. Among them, 2021 was the year of cybersecurity threats. And this year seems on track to top it. The question is becoming not if, or when, but who. Who exactly is respons...

    The Birth of the External Secrets Community

    Managing secrets in Kubernetes can be a cumbersome job. In a multi-service multi-environment setup, you can end up with hundreds of secrets without even noticing. It is hard to keep track of everythin...