CommandKDev Profile Banner
CommandK Profile
CommandK

@CommandKDev

Followers
116
Following
18
Media
2
Statuses
51

Secret Management best practices to stay compliant, enhance security, and improve developer productivity. All out of the box. Know more at https://t.co/ak1NMccROp

Mumbai/Bengaluru/San Francisco
Joined June 2022
Don't wanna be here? Send us removal request.
@MohapatraHemant
Hemant Mohapatra
2 years
A fantastic security founders event in the bay area today with @LightspeedIndia @descopeinc @CommandKDev @EndorLabs & @scrutsocial! Massive turnout, full of great conversations. Security is an evergreen area of investment for us and it's been great to see our india & US
1
5
36
@CommandKDev
CommandK
2 years
🔐 Elevate Your Kubernetes Security 🔐 Learn to protect your data with best practices. From RBAC and secret encryption to automated rotation. Manage sensitive data, network policies & advanced secret solutions. Full guide:
0
4
8
@dkhare
Dev Khare
2 years
Many founders fr India visiting SF Bay Area in Sept, excited to meet you at @saasboomi Caravan, @SaaStrAnnual! Since last yr, we've partnered w many new India/SEA->US founders incl @supabase, @PortkeyAI, @zluri_hq, @thenaplatform, @ZipstackHQ, @CommandKDev, @scrutsocial, others.
0
7
34
@CommandKDev
CommandK
2 years
In our latest blog post, we explore the ins and outs of Kubernetes Secrets. Check it out here:
0
1
2
@CommandKDev
CommandK
2 years
🔐 Kubernetes Secrets offer a way to keep your critical information separate from your app's code and config, minimizing the risk of exposure or unauthorized access. They're essential for airtight containerization and orchestration.
2
4
3
@CommandKDev
CommandK
2 years
At CommandK, we're reshaping how you secure and manage your secrets. We have already enabled large organizations to regain control of their secrets – in under 5 minutes.
0
0
0
@CommandKDev
CommandK
2 years
We are thrilled to share that CSO Online has recognized CommandK as one of the cybersecurity companies to watch for. Read more on the blog: https://t.co/HLlwL3FrR3.
Tweet card summary image
csoonline.com
These startups are jumping in where most established security vendors have yet to go.
1
6
13
@MohapatraHemant
Hemant Mohapatra
2 years
.@CommandKDev is building one of the world's smartest command centers for better enterprise security posture (secrets, api keys, configs & more). If you're a fast growing US enterprise, DM me; I'll intro you to the founders for early access. Cc @JayeshSidhwani @LightspeedIndia
@JayeshSidhwani
Jayesh S
2 years
There are so many incidents of data breaches. and if we are honest, there's not enough time to build all the safeguards that you really need! So what's the 80/20 you can do to prevent data breaches? Periodic Auditing. But you've got to do it the right way. Read our thoughts
0
4
14
@CommandKDev
CommandK
2 years
Read our latest blog on how to audit your secrets correctly! Do you have any experiences to share?
@JayeshSidhwani
Jayesh S
2 years
There are so many incidents of data breaches. and if we are honest, there's not enough time to build all the safeguards that you really need! So what's the 80/20 you can do to prevent data breaches? Periodic Auditing. But you've got to do it the right way. Read our thoughts
0
0
1
@shobhitic
Shobhit Bakliwal
2 years
just got a demo of what @JayeshSidhwani is building to solve this at @CommandKDev 👀 got onboarded and was good to go in 5 minutes. Engg leaders and managers should ping him asap to solve credentials management for your product
@shobhitic
Shobhit Bakliwal
2 years
0
14
23
@JayeshSidhwani
Jayesh S
2 years
If this sounds exciting, check out the Interview Process and apply here: https://t.co/v8aZPVAnBw.
1
1
3
@JayeshSidhwani
Jayesh S
2 years
Hiring 🚨: We're looking for a stellar Technical Content Writer! 💻🌟
7
13
24
@JayeshSidhwani
Jayesh S
2 years
Check it out here: https://t.co/5I1GrOtfBV.
0
2
5
@JayeshSidhwani
Jayesh S
2 years
Software architecture has become exponentially complex with 100s of integration points, but the way we handle secrets hasn't evolved with it. We think the only way to solve it is to rethink secret management at all points in the stack. How? Link in the next tweet
1
1
1
@JayeshSidhwani
Jayesh S
2 years
What do Uber, Heroku, and Capital One have in common? They lost millions of $$ in the last 2 years due to data breaches How could this happen at a place with such competent engineering teams? We think we know the answer (hint: it's not their fault)
1
12
29
@CommandKDev
CommandK
3 years
👋 Have you implemented a BYOK strategy at your organization? We’d love to hear your thoughts. #BYOK #DataSecurity #Encryption #KeyManagement #CloudSecurity
0
0
0
@CommandKDev
CommandK
3 years
🔄 Key rotation is a manual exercise, potentially causing operational hassles in rotating the key & re-encrypting existing data.
1
0
0
@CommandKDev
CommandK
3 years
🔓 Most CSP KMSs only support symmetric encryption strategies for BYOK.
1
0
0
@CommandKDev
CommandK
3 years
BYOK is merely a strategy that facilitates the successful implementation of sensitive data management. While the CSPs KMS simplify the adoption of BYOK, they do have some caveats to be aware of:
1
0
0
@CommandKDev
CommandK
3 years
🌍 Geo-Localization of data: As discussed earlier, the strategy facilitates the implementation of data localization guidelines.
1
0
0