Akeyless

The risks of autonomous AI in machine-to-machine interactions
In this Help Net Security, Oded Hareven, CEO of Akeyless Security, discusses how enterprises should adapt their cybersecurity strategies to address the growing need for …

Akeyless unveils Unified Secrets and Machine Identity Platform
Akeyless announced its Unified Secrets and Machine Identity Platform, designed to address the leading cause of breaches—compromised identity credentials. Organizations are …

Thales’ new secrets management solution improves DevOps and cloud security
At RSA Conference 2023, Thales introduced a new secrets management solution as part of its CipherTrust Data Security platform which unifies the discovery, classification, …

Akeyless raises $65 million to expand and enhance its platform
Akeyless has raised $65 million in series B funding, bringing the total funding to date to $80 million. The round was led by NGP Capital, with participation from existing …

The importance of securing machine-to-machine and human-to-machine interaction
In this interview with Help Net Security, Oded Hareven, CEO at Akeyless, explains how organizations manage secrets, particularly how this practice has changed and evolved amid …

Are your cryptographic keys truly safe? Root of Trust redefined for the cloud era
In the digital world, cryptographic solutions use encryption keys to secure data at rest, data in use, and data in transit. They are responsible for encrypting and decrypting …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility