LanesaK(@LanesaKenney) 's Twitter Profile Photo

Keep your cloud native Kubernetes environments secured and protected with Venafi Jetstack Secure. Try Venafi Jetstack Secure for free today. Your first cluster connection is on us: bit.ly/3rNFNRt

Keep your cloud native Kubernetes environments secured and protected with Venafi Jetstack Secure. Try Venafi Jetstack Secure for free today. Your first cluster connection is on us: bit.ly/3rNFNRt
account_circle
LanesaK(@LanesaKenney) 's Twitter Profile Photo

Issuing machine identities shouldn’t take hours or even minutes. With extremely low latency, Fast Issuance speeds certificate issuance in practically any environment—from the ground to the cloud. Apply for Early Access: bit.ly/3DDwhHe

Issuing machine identities shouldn’t take hours or even minutes. With extremely low latency, Fast Issuance speeds certificate issuance in practically any environment—from the ground to the cloud. Apply for Early Access: bit.ly/3DDwhHe
account_circle
LanesaK(@LanesaKenney) 's Twitter Profile Photo

.Jetstack's open source project, cert-manager, has graduated to the Cloud Native Computing Foundation (CNCF) incubation program

Shelley Boose explains what this means for developers and users.

bit.ly/3MQtFJ0

.@JetstackHQ's open source project, cert-manager, has graduated to the Cloud Native Computing Foundation (CNCF) incubation program

@sboose explains what this means for developers and users.

#Cybersecurity #MachineIdentities bit.ly/3MQtFJ0
account_circle
LanesaK(@LanesaKenney) 's Twitter Profile Photo

OpenSSL Project has released v3.0.7 of OpenSSL, fixing two severe security vulnerabilities in the 3.x branch of OpenSSL.

All versions of 3.x prior to 3.0.7 are vulnerable and should be upgraded ASAP. Learn more in Larry Seltzer's blog.

bit.ly/3WFrigB

account_circle
LanesaK(@LanesaKenney) 's Twitter Profile Photo

Venafi customers: are you ready for Day 3 of ? Explore the latest on zero trust with Venafi VP, Security Strategy & Threat Intelligence, Kevin Bocek and Cisco’s CTO, TK Keanini to help you understand if and when zero trust matters! bit.ly/3esAXpz

account_circle
LanesaK(@LanesaKenney) 's Twitter Profile Photo

Without enterprise-wide visibility, dangerous private tunnels with malicious traffic can get lost among the tunnels that contain good traffic.

Alexa Hernandez has some guidance for managing and protecting your TLS keys and certificates.

bit.ly/3t7VIKY

account_circle
LanesaK(@LanesaKenney) 's Twitter Profile Photo

Organizations need the ability completely respond to all breaches that impact keys and certificates immediately.

Learn about remediating keys and certificates after a data breach in Alexa Hernandez's blog.

bit.ly/3NiZFpD

account_circle
LanesaK(@LanesaKenney) 's Twitter Profile Photo

What are the risks of poorly managed SSH machine identities?

Read this guide to SSH key management, and learn 7 steps you can take now to protect them.

bit.ly/3MGwjBc

account_circle
LanesaK(@LanesaKenney) 's Twitter Profile Photo

Jetstack Secure now provides hardened FIPS 140-2 compliant versions of cert-manager for deployment into secure environments.

Irbe Krumina explains what this means for users.

bit.ly/3f4bl2y

account_circle
LanesaK(@LanesaKenney) 's Twitter Profile Photo

DevOps use is reaching a critical mass as more organizations adopt it to achieve digital transformation initiatives.

Read Alexa Hernandez's guide to learn what some of the key DevOps tools offer.

bit.ly/3NQQsVv

account_circle