DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Curious about the future of data-driven systems? Join our Data Engineering roundtable and learn how to build scalable data platforms.

Data Engineering: The industry has come a long way from organizing unstructured data to adopting today's modern data pipelines. See how.

Threat Detection: Learn core practices for managing security risks and vulnerabilities in your organization — don't regret those threats!

Managing API integrations: Assess your use case and needs — plus learn patterns for the design, build, and maintenance of your integrations.

Avatar

Keshav Malik

Security Engineer at TheInfosecGuy

Joined Nov 2022

Stats

Reputation: 179
Pageviews: 27.4K
Articles: 7
Comments: 0
  • Articles

Articles

article thumbnail
How To Secure Your CI/CD Pipelines With Honeytokens
Discover how honeytokens, digital decoys designed to detect unauthorized access, can strengthen the security of your CI/CD pipelines.
September 20, 2023
· 1,938 Views · 1 Like
article thumbnail
How to Handle Secrets in Kubernetes
One crucial aspect of ensuring a secure Kubernetes infrastructure is the effective management of secrets, such as API keys, passwords, and tokens.
May 21, 2023
· 2,122 Views · 1 Like
article thumbnail
How To Handle AWS Secrets
This blog post will cover some best practices for managing AWS secrets when using the AWS SDK in Python.
May 9, 2023
· 2,615 Views · 1 Like
article thumbnail
How To Handle Secrets in Jenkins
We will discuss the best practices for managing secrets in Jenkins, including configuring and managing secrets and how to handle potential security breaches.
April 22, 2023
· 4,785 Views · 1 Like
article thumbnail
How To Handle Secrets in Docker
DevOps engineers must handle secrets with care. In this series, we summarize best practices for leveraging secrets with your everyday tools, including code.
March 15, 2023
· 6,566 Views · 2 Likes
article thumbnail
How To Handle Secrets in Python
DevOps engineers must handle secrets with care. In this series, readers will learn about best practices for leveraging secrets with your everyday tools.
March 2, 2023
· 6,179 Views · 1 Like
article thumbnail
9 Things to Consider When Choosing an SCA Tool
SCA is an essential part of application security. Here are important factors to consider when selecting an SCA scanner to be sure it is suited to your needs.
January 6, 2023
· 3,168 Views · 1 Like

User has been successfully modified

Failed to modify user

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: