Local Guardrails for Secrets Security in the Age of AI Coding Assistants
Modern developer environments expose sensitive context across files, prompts, logs, and commands. Learn how layered local controls reduce secrets risk.
Modern developer environments expose sensitive context across files, prompts, logs, and commands. Learn how layered local controls reduce secrets risk.
Dive into our recap of AtlCloudCon, a community-led, developer-focused event offering practical insights for responsibly harnessing AI and securing cloud infrastructure.
Cybersecurity agencies from five different national governments put out a plea in December for developers to use memory-safe programming languages. Are you ready?
In this new series, CJ May shares his expertise in implementing secure-by-design software processes that empower engineering teams. The first stage of his DevSecOps program: vulnerability management.
Read our highlights from SCaLE 21x, where the community focused on all things open source, not just Linux, with over 270 sessions on DevOps, cloud tech, and security.
This post explores the best security advice we have received over the past almost 2 years from various different security professionals.
Learn how to effectively respond to an AWS key honeytoken trigger with this step-by-step guide. Investigate the incident, identify the leak source, secure your environment, and leverage OSINT techniques to protect your AWS infrastructure.
Read our summary of research that found millions of records that exposed user passwords due to misconfigured or missing security settings.
Enjoy the power of SOPS to secure your secrets with this new zine!
OWASP's annual Denver conference brought together thought leaders to talk about security, dependency management, and how AI is complicating our lives.
...despite all intentions to follow best practices, they don't. When you automate enforcement of best practices, you can ensure those practices are followed...
The State of Secrets Sprawl 2024 report by GitGuardian uncovers a 28% increase in leaked secrets on GitHub, revealing an urgent need for significantly improved security practices.
Microsoft has been experienced a sustained attack by Russian-backed nation-state attacker Midnight Blizzard (also known as NOBELIUM). This blog examines all we know so far