Improving Code Reviews with StorytellingAs we've woven commit narratives into the fabric of our code review process, we've seen firsthand how powerful it can be.
Tips for Using Open-Source Software in Software DevelopmentEmbracing these practices will empower your team to leverage open-source software effectively.
GitHub Actions and Doppler: Streamlining Your CI/CD PipelinesGitHub Actions and Doppler can significantly enhance your CI/CD pipelines, offering streamlined workflows, secure secrets management, and a plethora of integration options.
Secrets Management for CI/CDSecrets are used throughout the CI/CD pipeline, from accessing source code repositories to deploying applications in production environments.
Humans are the Weakest Link in CybersecurityLeaders in software companies must recognize the nature of human error and its potential to compromise even the most secure systems.
Software Security Policies You Should FollowCybersecurity is not a one-time effort but an ongoing commitment to vigilance, adaptation, and improvement.
2024 Data Breach Outlook: The Essential Role of Secrets Management in DefenseThe importance of robust cybersecurity measures, particularly in the realm of secrets management, has never been more critical
Insights from the Cloudflare 2023 Security BreachThis incident is a critical reminder of the vulnerabilities inherent in digital infrastructures and the importance of fortifying defenses against potential breaches.
Secrets Management for Mobile App DevelopmentBy following these best practices, developers can fortify their mobile apps against common security pitfalls associated with improper secrets management.
Securing Healthcare Apps: Secrets Management Techniques for Developers GuideUnveil the future of healthcare software development, where advanced secrets management ensures data security.
Lessons from the Mercedes-Benz Source Code ExposureExplore the crucial lessons from the Mercedes-Benz recent source code exposure in our in-depth analysis.
What the Terraform License Change Means for DevOpsTerraform will transition to Business Source License (BSL) v1.1, a non-open source license, starting from its next major version.
From Chaos to Control: Transform Your Secrets Workflow with SecretOpsRevolutionizing Secret Management: Introducing Workflow Automations with SecretOps
Announcing our Doppler SecretOps for Students ProgramDoppler is now part of the GitHub Student Developer Pack, educating students with industry best practices for managing secrets.
Automating Secrets Management: Why Manually Updating .env Files is Not DevOpsIt's time to automate how you inject environment variables into your applications.
Crash course in Web3 Application Development with PythonLearn how to send your first transaction on the Ethereum blockchain using Python and the Web3 package
Siloed Secrets and Security Theatre: Why We Need SecretOpsTo embrace modern software development practices and manage secrets at scale, we need to shift to a SecretsOps approach.
How to configure MongoDB 5 for TLS/SSL Connections on Debian/UbuntuLearn how to configure MongoDB connections over TLS/SSL the easy way, even when using self-signed certificates. No hacks required!
Dynamic TLS and SSL Certificates for Docker Compose with DopplerLearn how to easily and securely manage SSL and TLS certificates for Docker Compose applications using Doppler.
Joining Doppler: Aligning Values with PassionThe values at Doppler aren't derived from some document; they're built by our team and upheld by the way we work and interact with each other.
How to Set Environment Variables for a Python Django Application using Apache and mod_wsgi in DockerLearn the how to use environment variables with Apache and mod_wsgi for Python applications in Docker
Truffle Security Recommends Doppler For Remediating Leaked SecretsKeeping your secrets secure is not just about secrets management, but detecting accidental leaks when they occur and fixing them fast.
Kubernetes Security Hardening GuidanceEssential Kubernetes hardening guidance from the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA).
Taming Secret Sprawl with SecretOpsManaging secrets sprawled across multiple platforms and cloud providers doesn't have to be a nightmare. You just need a centralized source of truth.
Visual Studio Dev Containers For Node.js Apps on AWSLearn how to build a remote container-based development environment for Node.js Applications on AWS using Visual Studio Code Dev Containers.
Visual Studio Code Remote Dev Containers on AWS Set Up GuideLearn how to your configure your local and cloud based remote development environment for Visual Studio Code's Dev Containers.
The Triumph and Tragedy of .env FilesThey helped us in the past, but .env files are simply too risky and cumbersome for modern application development.
Using Environment Variables in Node.js for App Configuration and SecretsLearn why experienced Node.js developers use environment variables for app config and secrets, including how to manage default values and typecasting.
Achieving SOC 2 ComplianceDevelopers trust us with securely managing and serving millions of secrets and we're excited to announce that Doppler has achieved SOC 2 Compliance.
Using Environment Variables in Python for App Configuration and SecretsLearn how experienced developers use environment variables in Python, including managing default values and typecasting.
Ultimate Guide to Managing Mac and Linux Environment Variables in BashMost developers take years to fully master environment variables. This is what they know.
Application Configuration using PHP Environment VariablesBring SecretOps workflows to your PHP applications using environment variables for app secrets and configuration.