Skip to main content

Vault is a platform for centralized secrets management, encryption as a service, and identity-based access.

Vault 1.18 introduces support for IPv6 and CMPv2 while improving security team user experience

HashiCorp Vault 1.18 brings UI support for AWS Workload Identity Federation (WIF), PKI CMPv2 for 5G, and more.

Vault 1.18 introduces support for IPv6 and CMPv2 while improving security team user experience
Why we need short-lived credentials and how to adopt them
Why we need short-lived credentials and how to adopt them

Go from static credentials, to auto-rotation, to fully ephemeral “dynamic” credentials with two example roadmaps and see why short-lived credentials are so important.

Configuring dynamic secrets for a PostgreSQL and GitLab CI using HashiCorp Vault
Configuring dynamic secrets for a PostgreSQL and GitLab CI using HashiCorp Vault

Learn how to set up and issue short-lived credentials for a PostgreSQL database and in a GitLab CI pipeline with Vault, a secrets management platform.

Start planning for quantum computing cyberattacks now
Start planning for quantum computing cyberattacks now

Learn why and how you can start taking action now to prepare for quantum computers that will be capable of breaking today's encryption schemes.

HashiCorp and Red Hat, better together
HashiCorp and Red Hat, better together

The IBM acquisition of HashiCorp sets up a vision for more tightly integrating HashiCorp Terraform and Vault with Red Hat Ansible and OpenShift

Vault Enterprise 1.19 reduces risk with encryption updates and automated root rotation
Vault Enterprise 1.19 reduces risk with encryption updates and automated root rotation

Reduce risk and improve efficiency with Vault 1.19 updates including automated root rotation, encryption updates, and an improved UI.

3 cybersecurity stories from 2024 that show what we need to do in 2025
3 cybersecurity stories from 2024 that show what we need to do in 2025

The majority of attacks in 2025 aren’t going to be related to AI or use zero-days. They’ll continue to focus on the easiest exploits, including exposed credentials and user access patterns.