Join us

ContentUpdates from Truffle Security...
 Activity
@pixel_og started using tool Prometheus , 1 week, 4 days ago.
 Activity
@pixel_og started using tool OpenTofu , 1 week, 4 days ago.
 Activity
@pixel_og started using tool NixOs , 1 week, 4 days ago.
 Activity
@pixel_og started using tool Nginx , 1 week, 4 days ago.
 Activity
@tairascott gave 🐾 to Helm 4 or Nelm? What's the difference , 1 week, 6 days ago.
 Activity
 Activity
Link
@anjali shared a link, 1 week, 6 days ago
Customer Marketing Manager, Last9

How to Track Down the Real Cause of Sudden Latency Spikes

Sudden latency spikes rarely have a single cause. This blog shows how to uncover the real source using traces, histograms, and modern debugging signals.

track_latency
Link
@anjali shared a link, 2 weeks ago
Customer Marketing Manager, Last9

Hidden Correlations Traditional Monitoring Misses

Last9 is built to work with high-cardinality telemetry, and we’ve been covering it in detail through our series. This piece looks at a familiar pain: issues that only show up for a specific tenant or deployment. Why does that context disappear in most monitoring setups?

anamoly_detection
Story Trending
@shurup shared a post, 2 weeks ago
@palark

Helm 4 or Nelm? What's the difference

Helm werf

Helm 4.0.0 brought several new features to its users, such as Server-Side Apply support and kstatus-based resource watching.Nelm, an alternative to Helm created in werf, a CNCF Sandbox project, has been offering these capabilities even before. Nelm has many more new features for Kubernetes deploymen..

Truffle Security is the company behind TruffleHog, one of the most widely used open-source tools for discovering leaked secrets in code repositories, cloud environments, and developer infrastructure. The company focuses on securing the modern software supply chain by detecting exposed credentials early, validating them with high accuracy, and providing actionable remediation workflows.

Their platform supports large-scale scanning across GitHub, GitLab, Bitbucket, CI/CD systems, and enterprise codebases, with specialized products for continuous monitoring and automated alerting. Truffle Security works closely with security researchers and enterprises to reduce the risk of account takeovers, data breaches, and supply chain attacks driven by credential leakage. The company also invests in security research programs that uncover real-world vulnerabilities across open-source ecosystems.