ATLSECCON 2026: Context, Identity, and Restraint in Modern Security
From AI agents to identity abuse, ATLSECCON 2026 focused on how security teams can reduce exposure, improve visibility, and make trust enforceable while moving ever faster.
From AI agents to identity abuse, ATLSECCON 2026 focused on how security teams can reduce exposure, improve visibility, and make trust enforceable while moving ever faster.
Microsoft has been experienced a sustained attack by Russian-backed nation-state attacker Midnight Blizzard (also known as NOBELIUM). This blog examines all we know so far
Learn how GitGuardian Honeytoken's new feature, Deployment Jobs, revolutionizes early breach detection and code repository protection. Automate honeytoken deployment across multiple repositories with ease, ensuring ongoing security and peace of mind.
What you should know about the SEC's new rules on risk management and incident reporting
Meet Aslan Pishdad and learn about his commitment to his community and his customers as a Regional Sales Director for GitGuardian.
What is CSPM? Cloud Security Posture Management is about identifying and remediating security misconfigurations and risks to (IaaS) Infrastructure as a Service or (PaaS) Platform as a service environments.
Read highlights from Civo Navigate 2024's community event, featuring insights on scaling containers, cloud-native security challenges, and high-availability practices.
Learn why storing secrets in mobile apps is a major security risk, how to manage user and developer secrets properly, and why client-side secrecy is impossible. Find out the best practices for securing mobile app secrets and protecting your data.
Get insights into the EU's Digital Operational Resilience Act (DORA) and its impact on cybersecurity compliance for financial sector companies and their critical contractors.
Tackle secrets sprawl no matter where you are on your security journey. GitGuardian has a plan for everyone to take on secrets detection and remediation at scale.
As AI continues to reshape how code is written and managed, the emphasis on vigilant, security-conscious development practices becomes increasingly crucial. SAST stands as a critical tool in ensuring that the efficiencies gained through AI do not come at the cost of security and reliability.
Explore security findings from Datadog's research into recent attacks, highlighting two sophisticated attack methods and vital lessons in secrets security.