AWS IAM Security Best Practices
Identity and access management is a pillar of security. With the advent of the cloud, it got a lot more complicated. Here is a recap of the best practices to put in place to secure AWS IAM ... Read More
AWS IAM Security Best Practices
Identity and access management is a pillar of security. With the advent of the cloud, it got a lot more complicated. Here is a recap of the best practices to put in place to secure AWS IAM ... Read More
Key Highlights From the New NIST SSDF
In this article, we’ll be going over the 1.1 revision of The Secure Software Development Framework that was published earlier this year ... Read More
Key Highlights From the New NIST SSDF
In this article, we’ll be going over the 1.1 revision of The Secure Software Development Framework that was published earlier this year ... Read More
A Brief History of the DMCA
Learn more about the DMCA law and how it applies to digital artifacts like source code ... Read More
A Brief History of the DMCA
Learn more about the DMCA law and how it applies to digital artifacts like source code ... Read More
How To Setup Your Jenkins Pipeline with GitGuardian in Kubernetes
In this tutorial, we will show how to integrate GitGuardian Shield to run on one of the most famous CI tools: Jenkins (with a cool bonus!) ... Read More
How To Setup Your Jenkins Pipeline with GitGuardian in Kubernetes
In this tutorial, we will show how to integrate GitGuardian Shield to run on one of the most famous CI tools: Jenkins (with a cool bonus!) ... Read More
9 Extraordinary Terraform Best Practices That Will Change Your Infra World
This "best practices" article aims to tell you something you haven't read a hundred times. This article won't give you the answer to everything because there isn't one right answer that fits all. It aims to make you think about your unique situation and make the best decisions in accordance ... Read More
Securing Containers with Seccomp: Part 2
This tutorial will guide you through the setup of a GitHub Action generating a Seccomp filter for your application, a cutting-edge security feature for hardening containerized workloads ... Read More