Strategies for Scaling Cybersecurity Businesses | Craig Sandman

Scaling Your Security with Your Business

Why is Scalable Cybersecurity Essential in Your Business Growth? Have you ever pondered how the escalating complexities of your business can impact cybersecurity? This seemingly innocuous growth can expose your organization to a myriad of risks, particularly in the challenging terrain of Non-Human Identity (NHI) and secrets security. The Expanding ... Read More
Common secrets security misconfigurations you need to steer clear of

Common secrets security misconfigurations you need to steer clear of

In modern cybersecurity, the term ‘security misconfiguration’ might not evoke the immediate tension of a notorious virus or the dramatic flair of a cyber-attack. Yet, these misconfigurations are like quiet anomalies in the vast and complex digital infrastructure, often overlooked yet holding the power to unravel systems in subtle and ... Read More

API security risks, testing, protection best practices

All you need to know about API security risks and what to and apply in order to keep your API secure and protected from exposure. The post API security risks, testing, protection best practices appeared first on Entro ... Read More
Managing Kubernetes secrets with HashiCorp Vault vs. Azure Key Vault

Managing Kubernetes secrets with HashiCorp Vault vs. Azure Key Vault

Managing Kubernetes secrets with HashiCorp Vault vs. Azure Key Vault The post Managing Kubernetes secrets with HashiCorp Vault vs. Azure Key Vault appeared first on Entro ... Read More
Hard questions you should ask your secrets management service

Hard questions you should ask your secrets management service

Hard questions you should ask your secrets management service The post Hard questions you should ask your secrets management service appeared first on Entro ... Read More
The role of secrets management in zero trust architecture

The role of secrets management in zero trust architecture

The role of secrets management in zero trust architecture... The post The role of secrets management in zero trust architecture appeared first on Entro ... Read More
What are secrets management tools and platforms?

What are secrets management tools and platforms?

In cybersecurity, "secrets" does not refer to hushed conversations or confidential memos. Instead, it's all about the digital keys... The post What are secrets management tools and platforms? appeared first on Entro ... Read More
The Siemens PLC vulnerability: a deep dive into industrial cybersecurity

The Siemens PLC vulnerability: a deep dive into industrial cybersecurity

Imagine you’re a secret agent, and you’ve just discovered that the bad guys have a copy of your secrets decoder ring. Not such great news, right? That’s basically what happened to Siemens late last year. A bunch of hackers managed to get their hands on the global private keys for ... Read More
The MSI security breach: a tale of leaked keys and a reminder to keep our secrets safe

The MSI security breach: a tale of leaked keys and a reminder to keep our secrets safe

Another day, another breach. Micro-Star International (MSI), a renowned Taiwanese manufacturer of laptops, video adapters, and motherboards, recently fell victim to a ransomware attack. The orchestrators? A group known as Money Message. The fallout? A private code signing key leak that could impact hundreds of MSI products and beyond. Well, ... Read More
The tale of Neho’s misplaced keys and unwanted open houses

The tale of Neho’s misplaced keys and unwanted open houses

Imagine you’re hosting a lavish party at your swanky penthouse. The who’s who of the town are there, sipping champagne and nibbling on hors d’oeuvres. The chandeliers are sparkling, the jazz music is setting the mood, and the atmosphere is buzzing with the latest gossip and laughter. It’s the kind ... Read More