Jeffrey Kok stories
Protecting agile business innovation against devastation
As DevOps takes hold, more and more privileged account credentials and secrets are created and shared across interconnected access points.
Securing assets and applications in the cloud
Hard-coding and embedding credentials in the code or a script can initially make them easy to use – but this represents a significant vulnerability.
When innocent mistakes turn into costly problems
Insider threats can cause significant financial and productivity losses, with compromised accounts and malicious insiders being the most damaging. It's important for organisations to be aware of and prepared for these risks.