Guest Expert

Guest Expert

GitGuardian hires external cybersecurity experts to share their unique experience and knowledge in security on the GitGuardian blog.

95 posts
Twitter
The Runtime Secrets' Security Gap

The Runtime Secrets' Security Gap

The last mile in secrets security is securing secrets in workloads. Discover a new way to securely deliver encrypted secrets in your infrastructure with innovative open-source tools, and say goodbye to plaintext secrets.

How to Handle Secrets in Jupyter Notebooks

How to Handle Secrets in Jupyter Notebooks

From entering passwords with getpass to using secret managers like AWS Secrets Manager, this guide covers best practices for protecting sensitive information in your notebooks.

Pipeline Integrity and Security in DevSecOps

Pipeline Integrity and Security in DevSecOps

Last episode of C.J. May's series on implementing a DevSecOps program: how to harden your software delivery pipelines to maintain robust security measures.

Open-Source Software Security

Open-Source Software Security

Open-source software security is crucial in today's cloud-native world. Learn about vulnerabilities, dependencies, and tools to improve security in this in-depth blog post.

Secure-by-Design Software in DevSecOps

Secure-by-Design Software in DevSecOps

In this new series, CJ May shares his expertise in implementing secure-by-design software processes. The second part of his DevSecOps program is all about implementing secure-by-design software pipelines.

Vulnerability Management Lifecycle in DevSecOps

Vulnerability Management Lifecycle in DevSecOps

In this new series, CJ May shares his expertise in implementing secure-by-design software processes that empower engineering teams. The first stage of his DevSecOps program: vulnerability management.

How to Handle Mobile App Secrets

How to Handle Mobile App Secrets

Learn why storing secrets in mobile apps is a major security risk, how to manage user and developer secrets properly, and why client-side secrecy is impossible. Find out the best practices for securing mobile app secrets and protecting your data.

How SAST Tools Secure AI-generated Code

How SAST Tools Secure AI-generated Code

As AI continues to reshape how code is written and managed, the emphasis on vigilant, security-conscious development practices becomes increasingly crucial. SAST stands as a critical tool in ensuring that the efficiencies gained through AI do not come at the cost of security and reliability.

arrow-down