Guest Expert

Guest Expert

GitGuardian hires external cybersecurity experts to share their unique experience and knowledge in security on the GitGuardian blog.

91 posts
Twitter
Dynamic Application Security Testing: Benefits, Pitfalls, and Top Open-Source Solutions

Dynamic Application Security Testing: Benefits, Pitfalls, and Top Open-Source Solutions

In code security, not everything is "shift left." Dynamic testing is as important to help developers build and ship secure applications on the right-hand side of the SDLC. Let's explore the benefits, pitfalls, and popular open-source DAST tools in this blog post from the Escape team.

The Significance of Honeypots and the Rise of Honeytokens

The Significance of Honeypots and the Rise of Honeytokens

Discover the roles and risks of honeypots and honeytokens in cybersecurity with this article. Understand how they work, the benefits they bring to your security strategy, and the precautions needed to avoid potential pitfalls.

Secure by Default: Integrating GitGuardian in Vermeer's Software Development Lifecycle

Secure by Default: Integrating GitGuardian in Vermeer's Software Development Lifecycle

Discover how Vermeer Corporation transformed its software development lifecycle to prioritize security. Learn about their journey from open-source tools to adopting GitGuardian for seamless, integrated secret scanning, enhancing DevSecOps with a 'Secure by Default' approach.

How to Handle Secrets in Helm

How to Handle Secrets in Helm

Learn step-by-step techniques and best practices to handle secrets in Helm charts safely and effectively. Level up your Helm deployments today!

Protecting Your Software Supply Chain: Understanding Typosquatting and Dependency Confusion Attacks

Protecting Your Software Supply Chain: Understanding Typosquatting and Dependency Confusion Attacks

Typosquatting and dependency confusion are two common tactics used by hackers to exploit open-source package repositories. Understand how these attacks work and discover preventive measures to secure your infrastructure.

How to Handle Secrets with Azure Key Vault

How to Handle Secrets with Azure Key Vault

This tutorial details how to manage secrets effectively using Azure Key Vault. You'll learn how to create secrets and access them in both virtual machines and Kubernetes clusters.

Securing your CI/CD: an OIDC Tutorial

Securing your CI/CD: an OIDC Tutorial

The article highlights the significance of securing CI/CD systems and offers three best practices. It introduces OpenID Connect (OIDC) as a means to employ short-lived tokens for improved security.

arrow-down