MOST POPULAR
ATLSECCON 2024: Navigating the Future of Cybersecurity in Halifax
Explore ATLSECCON 2024: a journey through mindfulness, risk management, Active Directory security, understanding containers, and more in the far North of Halifax.
Guardian Goofs #4
It's time for our monthly humorous look at security. Celebrating the release of our State of Secrets Sprawl 2024 report, it's what we found while scanning GitHub.
Taking the Long View: GitGuardian's Approach to Market Relevance in Cyber
My perspective on how GitGuardian approaches the cybersecurity market with a focus on the long game.
The Open-Source Backdoor That Almost Compromised SSH
The open-source world narrowly escaped a sophisticated supply-chain attack that could have compromised countless systems. A stark reminder of the necessity of vigilant monitoring and rigorous vetting within the open-source ecosystem to maintain trust and security.
Atlanta Cloud Conference 2024: Responsible AI Use And Securing Cloud Deployments
Dive into our recap of AtlCloudCon, a community-led, developer-focused event offering practical insights for responsibly harnessing AI and securing cloud infrastructure.
Is your roadmap prioritizing memory safe programming languages?
Cybersecurity agencies from five different national governments put out a plea in December for developers to use memory-safe programming languages. Are you ready?
Vulnerability Management Lifecycle in DevSecOps
In this new series, CJ May shares his expertise in implementing secure-by-design software processes that empower engineering teams. The first stage of his DevSecOps program: vulnerability management.
SCaLE 21x: A Community Event About Much More Than Linux
Read our highlights from SCaLE 21x, where the community focused on all things open source, not just Linux, with over 270 sessions on DevOps, cloud tech, and security.
I asked 40 security experts to share their best advice, it didn't disappoint.
This post explores the best security advice we have received over the past almost 2 years from various different security professionals.
How To Respond To An AWS Key Honeytoken Trigger: A Detailed Guide
Learn how to effectively respond to an AWS key honeytoken trigger with this step-by-step guide. Investigate the incident, identify the leak source, secure your environment, and leverage OSINT techniques to protect your AWS infrastructure.
Misconfigurations in Google Firebase lead to over 19.8 million leaked secrets
Read our summary of research that found millions of records that exposed user passwords due to misconfigured or missing security settings.
SOPS [Security Zines]
Enjoy the power of SOPS to secure your secrets with this new zine!