Is your roadmap prioritizing memory safe programming languages?

Is your roadmap prioritizing memory safe programming languages?

Cybersecurity agencies from five different national governments put out a plea in December for developers to use memory-safe programming languages. Are you ready? ... Read More
Three Mechanisms to Protect Your Git Repositories

Three Mechanisms to Protect Your Git Repositories

...despite all intentions to follow best practices, they don't. When you automate enforcement of best practices, you can ensure those practices are followed ... Read More
Guardian Profile: Aslan Pishdad

Guardian Profile: Aslan Pishdad

Meet Aslan Pishdad and learn about his commitment to his community and his customers as a Regional Sales Director for GitGuardian ... Read More
A Quick Overview of the Digital Operational Resilience Act (DORA)

A Quick Overview of the Digital Operational Resilience Act (DORA)

| | Frameworks & Regulations
Get insights into the EU's Digital Operational Resilience Act (DORA) and its impact on cybersecurity compliance for financial sector companies and their critical contractors ... Read More
Let's Be Careful Out There | 'Hill Street Blues' Supercut

Five Ways Your CI/CD Pipeline Can Be Exploited

| | DevSecOps, Engineering
CI/CD pipelines can be exploited in a number of ways and we're going to share a few with you ... Read More
Three Tips To Use AI Securely at Work

Three Tips To Use AI Securely at Work

How can developers use AI securely in their tooling and processes, software, and in general? Is AI a friend or foe? Read on to find out ... Read More
Creating a .gitignore file - How we can use git ignore to prevent adding unwanted files to git

Secure Your Secrets with .env

| | Best Practices, DevSecOps
Using environment variables to store secrets instead of writing them directly into your code is one of the quickest and easiest ways to add a layer of protection to your projects ... Read More
Ethical Hacking Q&A

Ethical Hacking Q&A with Sonya Moisset

| | Tutorials
Join Mackenzie Jackson and Sonya Moisset for an eye-opening discussion about Ethical Hacking as Sonya answers questions from Mack and the webinar audience ... Read More