Guest Expert

Guest Expert

GitGuardian hires external cybersecurity experts to share their unique experience and knowledge in security on the GitGuardian blog.

93 posts
Twitter
How to Handle Secrets in Jupyter Notebooks

How to Handle Secrets in Jupyter Notebooks

From entering passwords with getpass to using secret managers like AWS Secrets Manager, this guide covers best practices for protecting sensitive information in your notebooks.

Pipeline Integrity and Security in DevSecOps

Pipeline Integrity and Security in DevSecOps

Last episode of C.J. May's series on implementing a DevSecOps program: how to harden your software delivery pipelines to maintain robust security measures.

Open-Source Software Security

Open-Source Software Security

Open-source software security is crucial in today's cloud-native world. Learn about vulnerabilities, dependencies, and tools to improve security in this in-depth blog post.

Secure-by-Design Software in DevSecOps

Secure-by-Design Software in DevSecOps

In this new series, CJ May shares his expertise in implementing secure-by-design software processes. The second part of his DevSecOps program is all about implementing secure-by-design software pipelines.

Vulnerability Management Lifecycle in DevSecOps

Vulnerability Management Lifecycle in DevSecOps

In this new series, CJ May shares his expertise in implementing secure-by-design software processes that empower engineering teams. The first stage of his DevSecOps program: vulnerability management.

How to Handle Mobile App Secrets

How to Handle Mobile App Secrets

Learn why storing secrets in mobile apps is a major security risk, how to manage user and developer secrets properly, and why client-side secrecy is impossible. Find out the best practices for securing mobile app secrets and protecting your data.

How SAST Tools Secure AI-generated Code

How SAST Tools Secure AI-generated Code

As AI continues to reshape how code is written and managed, the emphasis on vigilant, security-conscious development practices becomes increasingly crucial. SAST stands as a critical tool in ensuring that the efficiencies gained through AI do not come at the cost of security and reliability.

Securing The Software Delivery Pipeline With Honeytokens

Securing The Software Delivery Pipeline With Honeytokens

Discover how honeytokens enhance security by detecting breaches in real-time across the software development lifecycle. Learn how to deploy these decoy credentials and traps effectively, bolstering defenses against cyber threats.

Pulumi VS Terraform: The Definitive Guide to Choosing Your IaC Tool

Pulumi VS Terraform: The Definitive Guide to Choosing Your IaC Tool

Tiexin Guo Senior DevOps Consultant, Amazon Web Services Author | 4th Coffee In the cloud-native era, Infrastructure as Code (IaC; read more about it in this blog here) has become the de-facto standard for managing cloud infrastructure, and more. While Terraform has been around for

arrow-down