×

Download Now

First Name
Last Name
Company
Country
State
Postal Code - optional
Thank you!
Error - something went wrong!

Red vs Blue: Best Practices for Jenkins Credentials Management

January 18, 2019

CyberArk Labs published research on Jenkins credentials management in to educate organizations on potential security risks and share recommended mitigations and best practices for ensuring security and DevOps velocity. Jenkins is an open source automation server used to accelerate the software delivery process. Widely considered the de facto standard in open source continuous integration tools, the server effectively acts as the DevOps engine, addressing everything from source code management to delivering code to production.

In this session, we demonstrate common attack techniques via red and blue team tactics and share measures organizations can take to secure secrets and ultimately, protect enterprise assets from common attacks.

Previous Article
Securing Identity and Access Management Solutions
Securing Identity and Access Management Solutions

This blog provides a technical overview of IAM and the risks associated when IAM on-premises agents are not...

Next Article
Qealler — The Silent Java Credential Thief
Qealler — The Silent Java Credential Thief

Qealler is a new type of malware that CyberArk Labs recently detected in a spam campaign targeting corporat...