Chainguard Assemble 2026 and the Security Factory Mindset
From golden images to agent governance, Chainguard Assemble 2026 focused on how teams can reduce risk by embedding trust, compliance, and security into delivery systems.
From golden images to agent governance, Chainguard Assemble 2026 focused on how teams can reduce risk by embedding trust, compliance, and security into delivery systems.
We're unlocking new use cases with CyberArk. Explore the first-ever integration between our secrets management and secrets detection solutions and how they can help you keep your secrets protected at all times.
Tiexin Guo Senior DevOps Consultant, Amazon Web Services Author | 4th Coffee In the cloud-native era, Infrastructure as Code (IaC; read more about it in this blog here) has become the de-facto standard for managing cloud infrastructure, and more. While Terraform has been around for
Cloudflare experienced a security breach when its internal systems were compromised, leading to unauthorized access to sensitive data. Another incident highlights the importance of maintaining strict secrets security across the supply chain.
It's time for our monthly comic. This month: "Guarding your secrets -- For Kids!"
Discover GitGuardian's efficient POC-based approach to evaluating a secrets detection and remediation platform, simplifying the complex buying process for enterprises.
This article uses Kubernetes Secrets as a native Kubernetes component for handling sensitive data at container runtime and Vault as a trusted storage and maintenance solution for sensitive data.
Discover Arnault's journey as lead ML engineer at GitGuardian, tackling complex data science challenges and secrets management in cybersecurity.
CI/CD pipelines can be exploited in a number of ways and we're going to share a few with you
A new comic strip to better grasp the simple but effective way HasMySecretLeaked checks your secrets without asking you to reveal them!
Discover how GitGuardian enhances Application Security Posture Management, ASPM, with top-notch code security and secrets detection and remediation coordination.
How can developers use AI securely in their tooling and processes, software, and in general? Is AI a friend or foe? Read on to find out.
Kubernetes Service Account tokens are exploited in many attack chain scenarios. Learn how to mitigate these risks and secure your Kubernetes clusters effectively.