Skip to main content
Strategy & insights

Expert insights to drive your cloud strategy

Subscribe to RSS

Software provenance: Why visibility into your software supply chain matters

Establish comprehensive build provenance to track software artifact creation, modifications, ownership, and dependencies throughout the entire lifecycle.

Software provenance: Why visibility into your software supply chain matters
5 tips for credential management across multi-cloud
5 tips for credential management across multi-cloud

A platform engineer from InfoCert shares his best practices for secure authorization and secret management, and shows how the right tools can implement them.

Policy as code, explained
Policy as code, explained

Policy as code gives you an automated way to check, in minutes or seconds, if your IT and business stakeholders’ requirements are being followed in your infrastructure deployments.

Secret sprawl is costing you more than you think
Secret sprawl is costing you more than you think

Secret sprawl — the uncontrolled spread of credentials across development tools and repositories — is silently costing organizations millions annually through reduced developer productivity and security team overhead.

Why default secret detection rules don't work (and how to fix it)
Why default secret detection rules don't work (and how to fix it)

Transform noisy, one-size-fits-all secret scanning into precise threat detection using custom patterns, intelligent filtering, and automated severity-based workflows.

5 lessons from Moneybox’s Terraform journey
5 lessons from Moneybox’s Terraform journey

Learn about Moneybox’s infrastructure-scaling transformation, and how the transition to HCP Terraform supported it.

10 key questions about designing a secure cloud environment
10 key questions about designing a secure cloud environment

These are the crucial questions that business and technical leaders should be asking their cloud and platform teams about cloud security and compliance.