CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership May 03, 2026

Oracle Red Bull Racing Team Revs Up Automation to Boost Security

Dark Reading Archived May 03, 2026 ✓ Full text saved

While drivers race to shave off seconds on the track, the team's IT and engineering staff are speeding up how they deliver security.

Full text archived locally
✦ AI Summary · Claude Sonnet


    IDENTITY & ACCESS MANAGEMENT SECURITY CYBERSECURITY OPERATIONS CASE STUDIES News, news analysis, and commentary on the latest trends in cybersecurity technology. Oracle Red Bull Racing Team Revs Up Automation to Boost Security While drivers race to shave off seconds on the track, the team's IT and engineering staff are speeding up how they deliver security. Arielle Waldman,Features Writer,Dark Reading April 30, 2026 5 Min Read SOURCE: 1PASSWORD Another frantic call at 3 a.m.: The Oracle Red Bull Racing Formula One team discovered an issue in the wind tunnel testing its cars. It's up to Ian Brunton, head of software engineering for aerodynamics, to troubleshoot the problem. Even when he has shaken off his early-morning haze, the investigation could easily take an hour. But when it comes to racing, every second counts.  Many security-related considerations go into managing an F1 team. The tools, methods, and infrastructure that engineers use to design the cars require heavy investments, and the team needs to secure information from leaking to competitors. And as they're moving fast on and off the racetrack, teams also need to ensure they don't wind up with breaches, malware, or other various threats. System credentials and identities must be protected.  "Cyber is critical in F1," says Matt Cadieux, chief information officer at Red Bull Racing. "It's an engineering competition as well as a driver's competition. There's a lot of investment, and we need to protect our secrets and business continuity where we face the same threats that other companies do." Related:Microsoft Proposes Better Identity, Guardrails for AI Agents Maintaining speed and efficiency securely while managing 2,000 people and thousands of servers and clusters — some on-premises and some in the cloud — present challenges. A broad set of applications and well over 100 service accounts compounds the complexity. Over the past year, Oracle Red Bull Racing implemented 1Password tools for automation, credential access, governed access, and software-as-a-service (SaaS) management with two goals in mind: to enhance speed and security. Despite some learning curves, Cadieux and Brunton agree that the added automation accelerated processes that spilled over to car improvements as well.  Satisfying 100 Perfectionists F1 is all about speed, but it's not restricted to amping up the car; it's the speed of business activities, too. Users need to be productive and spend their brain power on how to make a faster car, instead of dealing with inefficient tools or downtime, Cadieux tells Dark Reading.  "Rather than people being frustrated, saying IT is rubbish, which people occasionally do, we're trying to minimize that and pull all their brain power and energy into thinking about the car and underlying infrastructure issues," he says.  While it's easy to cut corners and deploy a system without authentication, it will "bite you" every single time, Brunton warns. Strong authentication allows users to design a car versus having to report a problem.  Related:Delinea's StrongDM Acquisition Highlights the Changing Role of PAM "It affects people in my team, too," he says. "It becomes a cycle of problems."  People in the company grow impatient and will be very vocal if they see something that is less than optimal, unreliable, or too manual, Cadieux says.   "It's good to work at a place with a few hundred perfectionists or demanding users where tolerance for mediocrity is not very high," he says.  The 1Password partnership kicked off in February 2025 in a phased rollout that came with some small implementation challenges. While the system is officially in use, the team is still evolving prototypes and engaging in continuous improvements, Cadieux explains.  Understanding the API was the biggest hurdle from the engineering-aerodynamics side and required experimentation. They learned reconciliation — changing secrets within the system — and how long that takes to go through and update, Brunton says.   The service desk, infrastructure, and high-performance computing side also uses 1Password as a central repository. The biggest learning curve was that 1Password had to gain a business understanding before they learned to configure and use the tools so it could work for an F1 company. Cadieux worked with the consultant team that provided support and structure.  Related:SpecterOps Launches BloodHound Scentry to Accelerate the Practice of Identity Attack Path Management Fewer Wake-up Calls New automation and centralized credential access allows the teams to work faster, and the new tools helped modernize the early design stage for cars, Brunton says.  Cadieux and his team try to allow people to have some freedom in cloud-based services, but not free rein that could potentially introduce more risks. That's where the SaaS manager came in handy to monitor and understand user behavior regarding passwords and access controls, providing a visibility that they didn't previously have, Cadieux says.  Improving password hygiene is one area where the team saw benefits, enforcing positive behavior. Password managers help users efficiently avoid shortcuts that would compromise security, such as storing passwords in plaintext, that could allow attackers to steal credentials.  "It sounds simple, but it's actually really important when you have a few thousand people and when you're doing a lot of diverse things," Cadieux says.  Credential access is the main area where Brunton and his team interact with 1Password. Implementing a central place to store credentials is crucial because they have more than 100 entries in just one vault for one sub team. Again, it's all about speed, and one central place means they can access details quickly.  "We can control who sees which vault, which is quite useful," Brunton says, adding that they work on the principle of least privilege, so no user is granted too much access.  The team also strives to save as much time as they can when it comes to the wind tunnels, which are highly regulated; they are allotted 384 hours annually to run tests. The time constraint introduces a lot of pressure because they must use that budget carefully, and any system downtime becomes a massive problem very quickly, explains Brunton. Investigations mean scanning 20 services, 15 or 16 that are spread over two or three sites, as well as different Kubernetes clusters.  Wind tunnel recovery time reduced from one hour to two minutes under the new partnership. Having credentials in one place to log into different systems or connect to APIs quickly is a big benefit when trying to investigate a problem that is not clearly identified, Brunton says. "We were able to automate a reset of the system," he says.  A single-click reset button tears down and reestablishes the entire workflow, he explains. They can recover quicker, which means Brunton receives far fewer calls at 3 a.m.   Don't miss the latest Dark Reading Confidential podcast, NSA Chief During Snowden Affair Shares Regrets, Reflections 13 Years Later, for a candid conversation with Chris Inglis, head civilian in charge of the NSA during the Edward Snowden affair. Inglis reflects what the NSA should have done better, what he wants CISOs to know about protecting against their own insider threats, and what his reaction would be if Snowden received a pardon. Listen now! Read more about: CISO Corner About the Author Arielle Waldman Features Writer, Dark Reading Arielle spent the last decade working as a reporter, transitioning from human interest stories to covering all things cybersecurity related in 2020. Now, as a features writer for Dark Reading, she delves into the security problems enterprises face daily, hoping to provide context and actionable steps. She looks for stories that go past the initial news to understand where the industry is going. She previously lived in Florida where she wrote for the Tampa Bay Times before returning to Boston where her cybersecurity career took off at SearchSecurity. When she's not writing about cybersecurity, she pursues personal projects that include a mystery novel and poetry collection.     Want more Dark Reading stories in your Google search results? ADD US NOW More Insights Industry Reports How Enterprises Are Developing Secure Applications How Enterprises Are Harnessing Emerging Technologies in Cybersecurity Ditch the Data Center: Understanding Flexible Cloud Infrastructure Security Management 2025 State of Malware Sysdig 2025 Cloud-Native Security and Usage Report Access More Research Webinars How Well Can You See What's in Your Cloud? Implementing CTEM: Beyond Vulnerability Management Defending Against AI-Powered Attacks: The Evolution of Adversarial Machine Learning Zero Trust Architecture for Cloud environments: Implementation Roadmap Tips for Managing Cloud Security in a Hybrid Environment? More Webinars You May Also Like IDENTITY & ACCESS MANAGEMENT SECURITY Delinea's StrongDM Deal Sign of How PAM Has Changed by Jeffrey Schwartz MAR 12, 2026 IDENTITY & ACCESS MANAGEMENT SECURITY Orgs Move to SSO, Passkeys to Solve Bad Password Habits by Nate Nelson, Contributing Writer NOV 13, 2025 IDENTITY & ACCESS MANAGEMENT SECURITY 1Password Addresses Critical AI Browser Agent Security Gap by Arielle Waldman OCT 10, 2025 IDENTITY & ACCESS MANAGEMENT SECURITY NIST Digital Identity Guidelines Evolve With Threat Landscape by Arielle Waldman AUG 14, 2025 Latest Articles in DR Technology VULNERABILITIES & THREATS Bad Memories Still Haunt AI Agents APR 23, 2026 ENDPOINT SECURITY Two-Factor Authentication Breaks Free From the Desktop APR 16, 2026 ENDPOINT SECURITY Microsoft's Original Windows Secure Boot Certificate Is Expiring APR 16, 2026 APPLICATION SECURITY OWASP GenAI Security Project Gets Update, New Tools Matrix APR 6, 2026 Read More DR Technology Want more Dark Reading stories in your Google search results? BLACK HAT ASIA | MARINA BAY SANDS, SINGAPORE Experience cutting-edge cybersecurity insights in this four-day event. Use code DARKREADING for a Free Business Pass or $200 off a Briefings Pass. GET YOUR PASS
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◇ Industry News & Leadership
    Published
    May 03, 2026
    Archived
    May 03, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗