all tags
Secure-by-Design Software in DevSecOps

Secure-by-Design Software in DevSecOps

In this new series, CJ May shares his expertise in implementing secure-by-design software processes. The second part of his DevSecOps program is all about implementing secure-by-design software pipelines.

Guardian Goofs #4

Guardian Goofs #4

It's time for our monthly humorous look at security. Celebrating the release of our State of Secrets Sprawl 2024 report, it's what we found while scanning GitHub.

The Open-Source Backdoor That Almost Compromised SSH

The Open-Source Backdoor That Almost Compromised SSH

The open-source world narrowly escaped a sophisticated supply-chain attack that could have compromised countless systems. A stark reminder of the necessity of vigilant monitoring and rigorous vetting within the open-source ecosystem to maintain trust and security.

Start your journey to secrets-free source code

And keep your secrets out of sight

arrow-down