identity and access management

Navigating Passkeys: Challenges, Pitfalls and Considerations for Developers

While passkeys can dramatically improve the security and UX of authenticating users to applications, there’s a lot that still rests…

4 months ago

AWS Identity and Access Management (IAM) Roles and How to use Them

Amazon Web Services relies on the AWS IAM service to govern who is authenticated and authorized to use AWS resources.…

10 months ago

Why You Should Consolidate Your IAM

It’s not often you can get a win that makes your IT processes easier while simultaneously improving your cybersecurity. In…

1 year ago

Infrastructure Access Management a Growing DevOps Priority

Organizations plan to address access management over the next 12 months, as the need to secure and streamline infrastructure-wide access…

2 years ago

Best of 2021 – How to Revoke JSON Web Tokens (JWTs)

As we close out 2021, we at DevOps.com wanted to highlight the most popular articles of the year. Following is…

2 years ago

Could Full-Stack Observability Help Lessen IT’s Burden?

The year 2020 was a landmark year for many reasons, other than the obvious. The IT world saw the first…

3 years ago

Okta Adds Free Developer Edition to AppSec Service

Okta this week lowered the barrier to adoption of DevSecOps best practices by making available an Okta Starter Developer Edition…

3 years ago

The Best IAM Practices for DevOps

Through identity and access management (IAM), it is possible to assign policies that determine whether a user and the role…

3 years ago

Multi-Cloud Adoption: Time to Rethink Your Identity and Access Management

This may well be the decade that the data center’s reign falls, and multi-clouds prevail. A multi-cloud strategy, which incorporates…

4 years ago

Building Continuous Compliance into DevOps

“Continuous” is one of the operative words of DevOps. A major goal of DevOps is to make all processes continuous,…

5 years ago