Syndicated Blog

GitGuardian Blog – Code Security for the DevOps generation
A blog for developers, security engineers, and other cybersecurity professionals to learn about secrets and code security, DevSecOps, Infra-as-Code and much more.
Is your roadmap prioritizing memory safe programming languages?

Is your roadmap prioritizing memory safe programming languages?

Cybersecurity agencies from five different national governments put out a plea in December for developers to use memory-safe programming languages. Are you ready? ...
Vulnerability Management Lifecycle in DevSecOps

Vulnerability Management Lifecycle in DevSecOps

In this new series, CJ May shares his expertise in implementing secure-by-design software processes that empower engineering teams. The first stage of his DevSecOps program: vulnerability management ...
GitGuardian launches Software Composition Analysis to make Open Source an asset, not a threat

GitGuardian launches Software Composition Analysis to make Open Source an asset, not a threat

Read how the latest addition to GitGuardian code security platform, automates vulnerability detection, prioritization, and remediation in software dependencies, directly impacting the health of your codebase ...
The Re-Org Rag (I'm My Own VP)

SCaLE 21x: A Community Event About Much More Than Linux

| | Conferences
Read our highlights from SCaLE 21x, where the community focused on all things open source, not just Linux, with over 270 sessions on DevOps, cloud tech, and security ...
I asked 40 security experts to share their best advice, it didn't disappoint.

I asked 40 security experts to share their best advice, it didn’t disappoint.

|
This post explores the best security advice we have received over the past almost 2 years from various different security professionals ...
How To Respond To An AWS Key Honeytoken Trigger: A Detailed Guide

How To Respond To An AWS Key Honeytoken Trigger: A Detailed Guide

Learn how to effectively respond to an AWS key honeytoken trigger with this step-by-step guide. Investigate the incident, identify the leak source, secure your environment, and leverage OSINT techniques to protect your ...
Misconfigurations in Google Firebase lead to over 19.8 million leaked secrets

Misconfigurations in Google Firebase lead to over 19.8 million leaked secrets

| | Breach explained
Read our summary of research that found millions of records that exposed user passwords due to misconfigured or missing security settings ...
SOPS [Security Zines]

SOPS [Security Zines]

| | Security Zines
Enjoy the power of SOPS to secure your secrets with this new zine! ...
SnowFROC 2024: Securing The Future With OWASP Community In Denver

SnowFROC 2024: Securing The Future With OWASP Community In Denver

|
Denver, Colorado, is home to beautiful mountain views and an airport with an interesting Wikipedia page. You might know it as home to multiple sports teams or as the Mile High City ...
Three Mechanisms to Protect Your Git Repositories

Three Mechanisms to Protect Your Git Repositories

...despite all intentions to follow best practices, they don't. When you automate enforcement of best practices, you can ensure those practices are followed ...