
The Secrets Sprawl is Worse Than You Think: Key Takeaways from the 2025 Verizon DBIR
Discover 10 critical insights from the 2025 Verizon DBIR on secrets leaks, NHI risks, and credential abuse threats affecting today’s cloud-first orgs.
Discover 10 critical insights from the 2025 Verizon DBIR on secrets leaks, NHI risks, and credential abuse threats affecting today’s cloud-first orgs.
This time, we will see how to get a deeper integration between OPA and Kubernetes with Gatekeeper and native CRD-based policies.
The GitGuardian team is still striving to provide the broadest secrets detection engine, helping you find and fix all sorts of hardcoded secrets! Learn more about the specific and generic detectors our team has released in 2022 in this post.
Let's get our hands dirty with policy as code and write our first OPA policies for a Kubernetes environment.
New custom webhooks are now available to help you orchestrate your incident remediation workflows and processes outside of your GitGuardian Internal Monitoring workspace!
With great power comes great responsibility - and that's not just for superheroes. It's also true for your code!
If you have discovered that you have just exposed a sensitive file or secrets to a public git repository, there are some very important steps to follow.
BSidesSLC brought together security experts, developers and students from all over Utah and beyond. Read the highlights, featuring hands on labs, sessions and hackable badges.
When protecting your SDLC, you must choose. But choose wisely. For as the True Grail will bring you life. The False Grail will take it from you.
Hi Laurent! Can you tell us about your role at GitGuardian? Hi! I've been working at GitGuardian for four years now, making me the person with the longest tenure! For a few months, I have been a Staff Engineer, meaning I'
Continuing our series about potential attack scenarios, learn how a very easy configuration mistake on GitHub can lead to a major security breach.
Cybersecurity in Australia has moved well and truly into the focus of the mainstream media and the everyday public. This year we saw two catastrophic security breaches with Optus, an Australian telecom provider, and Medibank, one of the largest health insurance providers in Australia.
Software composition analysis is an essential part of application security. Here are the important factors to consider when selecting an SCA scanner to be sure it is well-suited to your needs.