Stop Leaking API Keys: The Backend for Frontend (BFF) Pattern Explained
A practical guide to the Backend for Frontend pattern for secrets management.
A practical guide to the Backend for Frontend pattern for secrets management.
This post explores the best security advice we have received over the past almost 2 years from various different security professionals.
Learn how to effectively respond to an AWS key honeytoken trigger with this step-by-step guide. Investigate the incident, identify the leak source, secure your environment, and leverage OSINT techniques to protect your AWS infrastructure.
Read our summary of research that found millions of records that exposed user passwords due to misconfigured or missing security settings.
Enjoy the power of SOPS to secure your secrets with this new zine!
OWASP's annual Denver conference brought together thought leaders to talk about security, dependency management, and how AI is complicating our lives.
...despite all intentions to follow best practices, they don't. When you automate enforcement of best practices, you can ensure those practices are followed...
The State of Secrets Sprawl 2024 report by GitGuardian uncovers a 28% increase in leaked secrets on GitHub, revealing an urgent need for significantly improved security practices.
Microsoft has been experienced a sustained attack by Russian-backed nation-state attacker Midnight Blizzard (also known as NOBELIUM). This blog examines all we know so far
Learn how GitGuardian Honeytoken's new feature, Deployment Jobs, revolutionizes early breach detection and code repository protection. Automate honeytoken deployment across multiple repositories with ease, ensuring ongoing security and peace of mind.
What you should know about the SEC's new rules on risk management and incident reporting
Meet Aslan Pishdad and learn about his commitment to his community and his customers as a Regional Sales Director for GitGuardian.