Guest Expert

Guest Expert

GitGuardian hires external cybersecurity experts to share their unique experience and knowledge in security on the GitGuardian blog.

92 posts
Twitter
Managing AWS IAM with Terraform - Part 2

Managing AWS IAM with Terraform - Part 2

In this second part, you will learn how to centralize IAM for multiple AWS accounts, create and use EC2 instance profiles, and implement just-in-time access with Vault.

How to make security policies a team effort

How to make security policies a team effort

Mark Bichon from Bearer, the SAST solution for mapping sensitive data flows, shares some essential tips to create security policies that don't feel like a development slowdown.

AWS IAM Security Best Practices

AWS IAM Security Best Practices

Identity and access management is a pillar of security. With the advent of the cloud, it got a lot more complicated. Here is a recap of the best practices to put in place to secure AWS IAM.

Securing Containers with Seccomp: Part 2

Securing Containers with Seccomp: Part 2

This tutorial will guide you through the setup of a GitHub Action generating a Seccomp filter for your application, a cutting-edge security feature for hardening containerized workloads.

Data Breach: a 5 Steps Response Plan

Data Breach: a 5 Steps Response Plan

A data breach is one of the worst scenarios in today’s enterprise security. What’s your plan to remediate this kind of situation, minimize the impact, and ensure business continuity? Although there is no such thing as a one-size-fits-all tactic, the following steps are crucial to a positive outcome.

arrow-down