all tags
GitGuardian is now SOC 2 Type I compliant

GitGuardian is now SOC 2 Type I compliant

Developed by the American Institute of CPAs (AICPA), SOC 2 defines criteria for managing customer data based on five “trust service principles”—security, availability, processing integrity, confidentiality, and privacy.

Data Breach: a 5 Steps Response Plan

Data Breach: a 5 Steps Response Plan

A data breach is one of the worst scenarios in today’s enterprise security. What’s your plan to remediate this kind of situation, minimize the impact, and ensure business continuity? Although there is no such thing as a one-size-fits-all tactic, the following steps are crucial to a positive outcome.

CI Pipelines: 5 Risks to Assess

CI Pipelines: 5 Risks to Assess

More and more parts of the software development process can occur without human intervention. However, this is not without its drawbacks. To keep your code and secrets safe, you should add the following security practices to your CI pipeline.

Security Chats - Igor, Director of Development at a large computer software company

Security Chats - Igor, Director of Development at a large computer software company

Igor Klyashchitskiy, Director of Development and his team have been using GitGuardian tools for 3 years to minimize the possibility of security violations that they could not find without automated secret detection. PeerSpot has interviewed him and written an objective and detailed review.

Start your journey to secrets-free source code

And keep your secrets out of sight