How to start consolidating your cybersecurity tools
In part 1 of this two-part blog series, we looked at why cybersecurity tool sprawl has become a critical risk and cost issue for modern enterprises. From overla...
In part 1 of this two-part blog series, we looked at why cybersecurity tool sprawl has become a critical risk and cost issue for modern enterprises. From overla...
New threats emerge every week, and many vendors respond with narrow, new reactive cybersecurity tool purchases to make sure a specific incident never happens ag...
If you've ever had to… Troubleshoot a production outage caused by an expired service account token Audit a codebase only to find API keys hard-coded in configur...
Air France-KLM supports passenger travel, cargo, and aircraft maintenance across Air France, KLM, and Transavia. That complexity and scale shows up in its IT de...
Vault Secrets Operator VSO has simplified secrets management between HashiCorp Vault and Kubernetes by automatically syncing secrets from Vault into Kubernetes...
With 2025 winding to a close, we've been reflecting on what we’ve learned and done this year. Across hundreds of customer conversations this year, the themes ha...
Today we are announcing the release of HashiCorp Boundary 0.21, which includes the general availability of RDP credential injection and new enhancements to the...
The rise of agentic AI systems represents a fundamental shift in how enterprises build and deploy software. Unlike traditional AI systems that primarily react t...
This week, we’re at re:Invent 2025 announcing new capabilities and highlighting some of the impactful work we’ve done in partnership with AWS this year. Togethe...
Organizations running workloads in AWS often need a secure, reliable way to manage secrets and encryption keys. At the same time, teams want to minimize operati...
Identity security is no longer just about people. Non-human identities NHIs now outnumber humans by 25-50x and have become one of the most important elements of...