all tags
How We Built a Supply Chain Security Watchtower: Meet SaaS-Sentinel

How We Built a Supply Chain Security Watchtower: Meet SaaS-Sentinel

SaaS-Sentinel is a free monitoring platform that notifies users when their favorite tool might be under attack, helping them stay on top of supply chain risks. Here is the full story of this innovative project that seeks to democratize the use of honeytokens. Join the adventure today!

How to Handle Secrets in Kubernetes

How to Handle Secrets in Kubernetes

This blog post covers creating, storing, and using secrets in Kubernetes, encryption, RBAC, and auditing. It introduces Kubernetes External Secrets and best practices to enhance security. Let's dive in!

The Secret Vulnerability Finance Execs are Missing

The Secret Vulnerability Finance Execs are Missing

Discover the overlooked vulnerability lurking in every corner of the finance industry. Hardcoded credentials in source code are an easy target for hackers, yet so common they're rarely discussed. Learn what companies can do to protect themselves against costly breaches.

Supply Chain Security: Secrets and Modern Security Frameworks (Part III)

Supply Chain Security: Secrets and Modern Security Frameworks (Part III)

In this final part, we'll discuss more software supply chain security frameworks and the critical role of secrets detection in them. We'll explore the NIST SSDF, SLSA, and OSC&R frameworks and how they cover the topic of secrets in software supply chain security.

Best Practices for Scanning and Securing Infrastructure as Code (IaC)[cheat sheet included]

Best Practices for Scanning and Securing Infrastructure as Code (IaC)[cheat sheet included]

Discover the best practices and tools to scan and secure your infrastructure as code (IaC) throughout the DevOps software development lifecycle. From threat modeling to monitoring, this comprehensive guide offers valuable insights to improve the security, reliability, and consistency of your IaC.

GitHub Actions Security Best Practices [cheat sheet included]

GitHub Actions Security Best Practices [cheat sheet included]

Learn how to secure your GitHub Actions with these best practices! From controlling credentials to using specific action version tags, this cheat sheet will help you protect against supply-chain attacks. Don't let a malicious actor inject code into your repository - read now!

Launching GitGuardian Honeytoken: your powerful ally in detecting supply chain breaches!

Launching GitGuardian Honeytoken: your powerful ally in detecting supply chain breaches!

What if you could detect intrusions and code leaks in your software supply chain? Introducing GitGuardian Honeytoken, the solution that protects your software supply chain against potential intrusions on SCM systems, CI/CD pipelines, software artifact registries, and more.

Start your journey to secrets-free source code

And keep your secrets out of sight

arrow-down