94 blog posts published by month since the start of 2022. Start from a different year:

Posts year-to-date
42 (0 posts by this month last year.)
Average posts per month since 2022
0.0

Post details (2022 to today)

Title Author Date Word count HN points
Managing AWS IAM with Terraform - Part 1 Guest Expert Jun 29, 2022 1529 -
Joining the GitGuardian Talent Acquisition Team Thomas Segura Jun 22, 2022 951 -
Q2 Product Roundup – Making secrets detection programs a reality for the enterprise Ziad Ghalleb Jun 21, 2022 910 -
Life is Too Short to Review Spaces Guardians Jun 17, 2022 1088 -
ggshield, the GitGuardian CLI [Security Zines] Thomas Segura Jun 13, 2022 510 -
Developer experience is security, our answer. Ziad Ghalleb Jun 10, 2022 1390 -
AWS IAM Security Best Practices Guest Expert Jun 08, 2022 4396 -
Forrester Research: The State of Application Security 2022 Ziad Ghalleb Jun 03, 2022 473 -
Key Highlights From the New NIST SSDF Guest Expert Jun 01, 2022 2038 -
4 Reasons MSPs Should Monitor Their GitHub Footprint Thomas Segura May 27, 2022 1117 -
Security Chats - Jon-Erik Schneiderhan, Senior SRE at a tech company Thomas Segura May 25, 2022 1101 -
A Brief History of the DMCA Guest Expert May 23, 2022 1499 2
Securing your SDLC (Software Development Life Cycle) Mackenzie Jackson May 18, 2022 3343 -
Security Chats - What Developers Say About Us Thomas Segura May 13, 2022 668 -
GitHub Actions Security Best Practices [cheat sheet included] Thomas Segura May 05, 2022 3435 1
GitGuardian’s New Nest Carole Winqwist May 04, 2022 168 -
Automate security testing in your CI pipelines with GitGuardian and CircleCI Ziad Ghalleb Apr 28, 2022 422 -
Detector of The Month – Stripe webhook secret, April 2022 Ziad Ghalleb Apr 27, 2022 520 -
How To Setup Your Jenkins Pipeline with GitGuardian in Kubernetes Guest Expert Apr 22, 2022 1467 -
How Hackers Used Stolen GitHub Tokens to Access Private Source Code Mackenzie Jackson Apr 20, 2022 700 -
Carrying Ambition Through Passion Thomas Segura Apr 19, 2022 1095 -
Investigating, prioritizing, and remediating thousands of hardcoded secrets incidents Ziad Ghalleb Apr 13, 2022 1215 -
Compromising CI/CD Pipelines with Leaked Credentials [Security Zines] Thomas Segura Apr 11, 2022 327 -
9 Extraordinary Terraform Best Practices That Will Change Your Infra World Guest Expert Apr 06, 2022 3117 -
Securing Containers with Seccomp: Part 2 Guest Expert Apr 01, 2022 2052 3
Detector of The Month – Redis, March 2022 Ziad Ghalleb Mar 31, 2022 646 -
DevSecOps and the AppSec Shared Responsibility Model Thomas Segura Mar 28, 2022 464 -
Latest from Lapsus$, Reviewing the Microsoft Breach Mackenzie Jackson Mar 25, 2022 998 -
Secrets in Git Repos [Security Zines] Ziad Ghalleb Mar 16, 2022 715 -
Securing Containers with Seccomp: Part 1 Guest Expert Mar 14, 2022 1559 -
Samsung and Nvidia are the latest companies to involuntarily go open-source leaking company secrets Mackenzie Jackson Mar 09, 2022 735 -
The State of Secrets Sprawl 2022 Thomas Segura Mar 02, 2022 450 -
GitGuardian enters the FT120! Carole Winqwist Mar 01, 2022 189 -
Detector of The Month – PlanetScale, February 2022 Ziad Ghalleb Feb 28, 2022 698 -
Security Chats - Don Magee, Security Engineer at a tech services company Carole Winqwist Feb 25, 2022 451 -
Kubernetes Hardening Tutorial Part 3: Authn, Authz, Logging & Auditing Guest Expert Feb 23, 2022 2061 2
No stone left unturned: detecting custom patterns is now available in GitGuardian. Ziad Ghalleb Feb 16, 2022 495 -
Security Chats - Abbas, Head of Infosec at a tech services company Carole Winqwist Feb 09, 2022 321 -
Mackenzie Jackson, GitGuardian: “code security needs to be a layered approach” Mackenzie Jackson Feb 09, 2022 1219 -
Documentation as a Killer Feature Thomas Segura Feb 07, 2022 728 -
Detector of The Month – Datadog, January 2022 Ziad Ghalleb Jan 31, 2022 850 -
GitGuardian is a proud sponsor of OWASP Mackenzie Jackson Jan 31, 2022 755 -
GitGuardian is now SOC 2 Type I compliant Carole Winqwist Jan 26, 2022 221 -
Data Breach: a 5 Steps Response Plan Guest Expert Jan 21, 2022 1689 2
Security Chats - Blake, DevSecOps Engineer at a large computer software company Carole Winqwist Jan 19, 2022 309 -
Infrastructure as Code - Everything You Need to Know Guest Expert Jan 14, 2022 1976 -
AppSec 2022 Resolutions: find inspiration in this report from Gartner on mitigating software supply chain security threats Ziad Ghalleb Jan 13, 2022 318 -
Security Chats - Andy, Senior Security Engineer at an insurance company Carole Winqwist Jan 11, 2022 373 -
CI Pipelines: 5 Risks to Assess Guest Expert Jan 07, 2022 1606 -
Kubernetes Hardening Tutorial Part 2: Network Guest Expert Jan 05, 2022 1932 2
Security Chats - Igor, Director of Development at a large computer software company Carole Winqwist Jan 02, 2022 304 -
Implementing a Secrets Detection Program for the Enterprise – a case study Ziad Ghalleb Jul 07, 2022 1074 -
OWASP AppSec Days France 2025: Learning To Defend The Global Supply Chain Together Dwayne McDaniel Sep 26, 2025 1463 -
Terraform Secrets Management Best Practices: Secret Managers and Ephemeral Resources Tiexin Guo Oct 09, 2025 2195 -
GitGuardian Introduces One-Click Secret Revocation to Accelerate Incident Response Soujanya Ain Sep 23, 2025 1202 -
How to Use NHI Governance as Your Central Dashboard to Monitor AWS IAM Tiexin Guo Sep 29, 2025 1295 -
SREday SF 2025: Human Centered SRE In An AI World Dwayne McDaniel Oct 13, 2025 1662 -
Red Hat GitLab Data Breach: The Crimson Collective's Attack Guillaume Valadon, Carole Winqwist Oct 03, 2025 1705 -
The GhostAction Campaign: 3,325 Secrets Stolen Through Compromised GitHub Workflows Gaetan Ferry, Guillaume Valadon Sep 05, 2025 1497 -
Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT Dwayne McDaniel Sep 19, 2025 1583 -
Shai-Hulud: A Persistent Secret Leaking Campaign Gaetan Ferry Sep 16, 2025 852 -
When Google Says "Scan for Secrets": A Complete Guide to Finding Hidden Credentials in Salesforce Guillaume Valadon Sep 03, 2025 879 -
DevOps Days Philadelphia 2025: Security As A Control Loop, Resilience, Runtime Risks, And How AI Is Changing It Dwayne McDaniel Oct 06, 2025 1507 -
GitHub Copilot Security and Privacy Concerns: Understanding the Risks and Best Practices Dwayne McDaniel Mar 27, 2025 2041 -
How Cybercriminal Organizations Weaponize Exposed Secrets Guillaume Valadon, Gaetan Ferry Oct 10, 2025 693 -
Security Lessons For All From GitHub's Hardened Package Publication For npm Dwayne McDaniel Oct 02, 2025 1435 -
Detect Secrets in GitLab CI Logs using ggshield and Bring Your Own Source Philippe Gablain, Soujanya Ain Sep 17, 2025 1602 -
INCYBER Forum Canada 2025: Collaboration Wins Over Compliance Dwayne McDaniel Oct 21, 2025 1540 -
The State of Secrets Sprawl 2025 Soujanya Ain Mar 11, 2025 734 -
Rethinking Security Resilience And Getting Back To Basics At CornCon 11 Dwayne McDaniel Oct 16, 2025 1638 -
Building Chromegg: A Chrome Extension for Real-Time Secret Detection Andy Rea Oct 20, 2025 1319 -
OAuth for MCP - Emerging Enterprise Patterns for Agent Authorization Thomas Segura Oct 17, 2025 2901 -
From Path Traversal to Supply Chain Compromise: Breaking MCP Server Hosting Gaetan Ferry Oct 22, 2025 2208 -
Scanning GitHub Gists for Secrets with Bring Your Own Source Anna Nabiullina, Romain Jouhannet Oct 27, 2025 1167 -
LASCON XV: From AI Risk To Identity Security In AppSec Dwayne McDaniel Oct 29, 2025 1391 -
The Hidden Cost of Secrets Sprawl Soujanya Ain Oct 30, 2025 1713 -
Working Towards Improved PAM: Widening The Scope And Taking Control Dwayne McDaniel Oct 31, 2025 1271 -
Identity Architecture Now Drives Cyber Risk: Techno Security & Digital Forensics Conference West 2025 Dwayne McDaniel Nov 04, 2025 1464 -
BSides Chicago 2025: Operationalizing Identity Risk In Cloud-Native Environments Dwayne McDaniel Nov 06, 2025 1636 -
Q3 2025: NHI Security Gets More Real Soujanya Ain Nov 11, 2025 1533 -
Queen City Con 0x3: Hacking And Embracing Resiliency Dwayne McDaniel Nov 12, 2025 1675 -
API Key Security: 7 Enterprise-Proven Methods to Prevent Costly Data Breaches Tiexin Guo Nov 14, 2025 2297 -
Trust Beyond Containers: Identity and Agent Security Lessons from KubeCon 2025 Dwayne McDaniel Nov 20, 2025 1925 -
Workload And Agentic Identity at Scale: Insights From CyberArk's Workload Identity Day Zero Dwayne McDaniel Nov 21, 2025 1256 -
OWASP Top 10 2025 Updates: Supply Chain, Secrets, And Misconfigurations Take Center Stage Dwayne McDaniel Nov 24, 2025 1287 -
Shai-Hulud 2.0: the supply chain attack that learned Guillaume Valadon, Gaetan Ferry Nov 24, 2025 862 -
How Machine Learning Transforms Security Alert Chaos into Actionable Intelligence Soujanya Ain, Alexandre Pradeilles Nov 28, 2025 947 -
A Complete Guide to Transport Layer Security (TLS) Authentication Tiexin Guo Nov 25, 2025 3875 -
Mutual TLS (mTLS) Authentication - A Complete Guide  Tiexin Guo Dec 02, 2025 3682 -
Lessons in Testing, Performance, and Legacy Systems from /dev/mtl 2025 Dwayne McDaniel Dec 03, 2025 1637 -
How Orange Business Transformed Secrets Security with a Prevention-First Approach Soujanya Ain Dec 04, 2025 1729 -
From Detection to Defense: How Push-to-Vault Supercharges Secrets Management for DevSecOps Dwayne McDaniel Dec 05, 2025 1647 -
OIDC for Developers: Reasons Your Auth Integration Could Be Broken Thomas Segura Dec 11, 2025 2135 -
How To Use ggshield To Avoid Hardcoded Secrets [cheat sheet included] Dwayne McDaniel Dec 10, 2025 2574 -