Carole Winqwist

Carole Winqwist

Carole is the CMO at GitGuardian, she is developing the brand and the marketing strategy to bring GitGuardian to new heights.

91 posts
Has My Secret Leaked? [Security Zines]

Has My Secret Leaked? [Security Zines]

A new comic strip to better grasp the simple but effective way HasMySecretLeaked checks your secrets without asking you to reveal them!

AI and Cybersecurity in 2024 - What's Changing and Why It Matters

AI and Cybersecurity in 2024 - What's Changing and Why It Matters

Tired of the AI hype? We get it. Our latest blog takes a no-nonsense look at AI in 2024's cybersecurity – just the facts and some thoughtful insights. No earth-shattering revelations, just a decent read for your coffee break.

Are the Fears about the EU Cyber Resilience Act Justified?

Are the Fears about the EU Cyber Resilience Act Justified?

Discover the inner workings of the recently implemented Cyber Resilience Act (CRA) in the EU and explore why this framework has raised concerns about jeopardizing the open-source ecosystem. Join us in our latest blog post to delve into this important topic.

Microsoft AI involuntarily exposed a secret giving access to 38TB of confidential data for 3 years

Microsoft AI involuntarily exposed a secret giving access to 38TB of confidential data for 3 years

Discover how an overprovisioned SAS token exposed a massive 38TB trove of private data on GitHub for nearly three years. Learn about the misconfiguration, security risks, and mitigation strategies to protect your sensitive assets.

From GitHub Leak to Pwn: A Hacker’s Kill Chain

From GitHub Leak to Pwn: A Hacker’s Kill Chain

Discover how seemingly minor mistakes, like leaking a secret to a non-publicly accessible resource, can lead to a major breach. In this engaging scenario, see how an attacker would chain vulnerabilities to access highly sensitive areas, and learn a valuable lesson along the way.

Wake-up call: why it's urgent to deal with your hardcoded credentials and secrets

Wake-up call: why it's urgent to deal with your hardcoded credentials and secrets

The figures are precise: stolen credentials remain the most common cause of a data breach. So how are there still thousands of hardcoded secrets hiding in source code, CI/CD pipelines, or Docker images, and, more importantly, how should we deal with them?

From Code to Cloud: Security for Developers [cheat sheet included]

From Code to Cloud: Security for Developers [cheat sheet included]

In this cheat sheet, we will walk you through the different stages of the software development lifecycle and highlight key security considerations and tools that can help you mitigate risks and protect your code.

The Art of Protecting Secrets: Eight Essential Concepts for SecOps Practitioners

The Art of Protecting Secrets: Eight Essential Concepts for SecOps Practitioners

Secrets management is an art, and mastering it requires a deep understanding of security protocols, meticulous attention to detail, and a proactive approach to staying ahead of threats. In this blog, we present you with eight essential concepts to enhance your credential management strategy.

arrow-down