Secrets detection

A collection of 45 posts

Guardian Goofs #2

Guardian Goofs #2

It's time for our monthly comic. This month: "Guarding your secrets -- For Kids!"

Wake-up call: why it's urgent to deal with your hardcoded credentials and secrets

Wake-up call: why it's urgent to deal with your hardcoded credentials and secrets

The figures are precise: stolen credentials remain the most common cause of a data breach. So how are there still thousands of hardcoded secrets hiding in source code, CI/CD pipelines, or Docker images, and, more importantly, how should we deal with them?

Why you should look beyond source code for exposed secrets

Why you should look beyond source code for exposed secrets

Learn more about the various sources of exposed secrets beyond source code repositories. From CI/CD systems to container images, runtime environments to project management tools, uncover the risks associated with storing secrets in these sources.

The Secret Vulnerability Finance Execs are Missing

The Secret Vulnerability Finance Execs are Missing

Discover the overlooked vulnerability lurking in every corner of the finance industry. Hardcoded credentials in source code are an easy target for hackers, yet so common they're rarely discussed. Learn what companies can do to protect themselves against costly breaches.

GitGuardian vs. Custom-Built Secrets Detection Tools

GitGuardian vs. Custom-Built Secrets Detection Tools

DIY or open-source secrets detection can seem cost-effective and customizable initially... until you start hitting the first obstacles like scalability, developer experience (DX), or deep application security expertise. Read on to find out how GitGuardian can help you rise above these!

arrow-down