

MOST POPULAR

Detector of The Month – PlanetScale, February 2022
Keep secrets out of your source code. GitGuardian's automated secrets detection supports PlanetScale database passwords and tokens.

Security Chats - Don Magee, Security Engineer at a tech services company
Don, security engineer, considers secrets in source as his n°1 priority. After using GitGuardian for 2 years, read his opinions on the product features.

Kubernetes Hardening Tutorial Part 3: Authn, Authz, Logging & Auditing
Learn how to set up an AWS EKS cluster with Terraform and leverage best practices to configure roles, service accounts, logging, and auditing with useful tools.

No stone left unturned: detecting custom patterns is now available in GitGuardian.
GitGuardian users can now extend the secrets detection engine and configure custom patterns to detect proprietary secrets and credentials.

Security Chats - Abbas, Head of Infosec at a tech services company
Abbas Haidar and his team use GitGuardian Internal Monitoring to scan their source code and avoid secret sprawl. Here are his thoughts about the product.

Mackenzie Jackson, GitGuardian: “code security needs to be a layered approach”
Security should be something that companies implement into the software development lifecycle as early as possible. It should be a consideration at every step of development, from design and through to deployment and every incremental change made thereafter.

Documentation as a Killer Feature
Julia recently joined GitGuardian to improve the product experience for Enterprise users. She explained to us how documentation could be an essential asset to achieve that objective and what drove her to become a Guardian in the first place.

Detector of The Month – Datadog, January 2022
Keep secrets out of your source code. GitGuardian's automated secrets detection supports Datadog API and Application keys.

GitGuardian is a proud sponsor of OWASP
GitGuardian is excited to support OWASP as a gold corporate member of the organization.

GitGuardian is now SOC 2 Type I compliant
Developed by the American Institute of CPAs (AICPA), SOC 2 defines criteria for managing customer data based on five “trust service principles”—security, availability, processing integrity, confidentiality, and privacy.

Data Breach: a 5 Steps Response Plan
A data breach is one of the worst scenarios in today’s enterprise security. What’s your plan to remediate this kind of situation, minimize the impact, and ensure business continuity? Although there is no such thing as a one-size-fits-all tactic, the following steps are crucial to a positive outcome.

Security Chats - Blake, DevSecOps Engineer at a large computer software company
Blake and his team use GitGuardian Internal Monitoring to keep secrets out of their source code. He explained to PeerSpot the benefits he and his organization have seen in adopting this product.