top of page
Ruminations
Search
Charles Edge
May 10, 20235 min read
Infrastructure as Code and how we can improve on the use of shared secrets
Infrastructure as code (IaC) is the practice of managing and provisioning computer data centers through machine-readable definition...
6 views0 comments
Charles Edge
May 10, 20233 min read
How to Outsource Programming Tasks Safely
Outsourcing programming tasks can be a great way to save time and money, but it's important to do it safely. That begins with picking an...
2 views0 comments
Charles Edge
May 10, 20232 min read
Our Journey With AI And AI Hallucinations
Nearly every product these days needs to feature Artificial intelligence (AI). We've been training data to detect anomolies in the...
2 views0 comments
Charles Edge
May 10, 20232 min read
Effective Software Version Control, And Beyond!
At Secret Chest, we want to manage everything like we manage software, which is to say we'd love a layer of version control and an audit...
6 views0 comments
Charles Edge
May 10, 20233 min read
Writing A Great Infosec Position Description
We're going to be hiring a number of people in security. It's what we do. And we like to think a bit more deeply about things than we...
4 views0 comments
Charles Edge
May 10, 20233 min read
Scaling Process To The Size Of A Company
Startups often begin as a company with a person that does stuff. Then we hire people. Then there are other people doing stuff - and we...
1 view0 comments
Charles Edge
May 10, 20233 min read
Tips When Writing Privacy Policies
As we write the privacy policy for Secret Chest, it occured to us that we could share some thoughts for others doing the same. A privacy...
2 views0 comments
Charles Edge
May 10, 20232 min read
10 Ways To Protect Passwords
The future may be passwordless. But there will always be passwords, if only to unlock or install the tokens that we use as passwords. So...
7 views0 comments
Charles Edge
May 10, 20235 min read
How Secret Management Fits Into Modern, Layered, Zero Trust Architectures
In today's digital world, we are constantly creating and using new passwords. From our email accounts to our social media profiles, we...
5 views0 comments
Charles Edge
May 10, 20234 min read
The Encryption Architecture Underneath Secret Chest
Encryption is a process of converting data into a form that is unreadable by unauthorized individuals. This is done by using an...
3 views0 comments
Charles Edge
May 10, 20233 min read
Passkeys and Password Managers
Passwords are a pain. They're hard to remember, they're easy to forget, and they're often easy to hack. That's why a new type of password...
12 views0 comments
Charles Edge
May 10, 20235 min read
ZTNA, VPN, and Modern Approaches To Securing Data Flows
TLDR: Secret Chest is API-first with webhook support, so if a device exhibits abnormal behavior in a ZTNA solution or other security...
16 views0 comments
Charles Edge
Apr 19, 20233 min read
Guardians of the Digital Gates: Demystifying the World of Security Researchers
In the sprawling cyber realm, where lines blur between data havens and potential battlegrounds, a dedicated breed navigates the...
3 views0 comments
Charles Edge
Apr 15, 20232 min read
Mythbusters: Password Managers Exposed! Sorting Fact from Fiction in Your Digital Vault
Let's face it, password managers get a bad rap sometimes. Whispers of "single point of failure", "hacking havens", and...
2 views0 comments
Charles Edge
Apr 11, 20234 min read
How Apple Protects Data On Our Devices
Apple has developed a number of technologies to protect data on the nearly 2 billion computers, phones, and tablets that are in the wild....
9 views0 comments
Charles Edge
Apr 10, 20233 min read
Installing The Latest MongoDB On A Mac
MongoDB is a database renowned for its flexibility and scalability. Traditionally, databases store data in rigid rows and columns, like...
6 views0 comments
Charles Edge
Apr 5, 20232 min read
Phishing Frenzy: How to Spot and Avoid Deceptive Emails
Imagine: an email promising untold riches, a free vacation, or the dire warning of an imminent account closure. Or maybe all of the...
10 views0 comments
Charles Edge
Apr 5, 20235 min read
The Evolution of Ransomware
The first known instance of ransomware might have been the AIDS Trojan (or PC Cyborg Virus) in 1989. This floppy disk-based malware,...
2 views0 comments
Charles Edge
Apr 4, 20232 min read
Using AI To Streamline Product Management Processes
Product management is a dynamic field that constantly seeks innovative solutions to enhance efficiency and decision-making. In recent...
2 views0 comments
Charles Edge
Apr 3, 20232 min read
Installing Secret Chest On Additional Devices
This article is written under the assumption that Secret Chest was installed on at least one device before going through these steps, as...
12 views0 comments
bottom of page