| Managing AWS IAM with Terraform - Part 1 |
Guest Expert |
Jun 29, 2022 |
1529 |
- |
| Joining the GitGuardian Talent Acquisition Team |
Thomas Segura |
Jun 22, 2022 |
951 |
- |
| Q2 Product Roundup – Making secrets detection programs a reality for the enterprise |
Ziad Ghalleb |
Jun 21, 2022 |
910 |
- |
| Life is Too Short to Review Spaces |
Guardians |
Jun 17, 2022 |
1088 |
- |
| ggshield, the GitGuardian CLI [Security Zines] |
Thomas Segura |
Jun 13, 2022 |
510 |
- |
| Developer experience is security, our answer. |
Ziad Ghalleb |
Jun 10, 2022 |
1390 |
- |
| AWS IAM Security Best Practices |
Guest Expert |
Jun 08, 2022 |
4396 |
- |
| Forrester Research: The State of Application Security 2022 |
Ziad Ghalleb |
Jun 03, 2022 |
473 |
- |
| Key Highlights From the New NIST SSDF |
Guest Expert |
Jun 01, 2022 |
2038 |
- |
| 4 Reasons MSPs Should Monitor Their GitHub Footprint |
Thomas Segura |
May 27, 2022 |
1117 |
- |
| Security Chats - Jon-Erik Schneiderhan, Senior SRE at a tech company |
Thomas Segura |
May 25, 2022 |
1101 |
- |
| A Brief History of the DMCA |
Guest Expert |
May 23, 2022 |
1499 |
2 |
| Securing your SDLC (Software Development Life Cycle) |
Mackenzie Jackson |
May 18, 2022 |
3343 |
- |
| Security Chats - What Developers Say About Us |
Thomas Segura |
May 13, 2022 |
668 |
- |
| GitHub Actions Security Best Practices [cheat sheet included] |
Thomas Segura |
May 05, 2022 |
3435 |
1 |
| GitGuardian’s New Nest |
Carole Winqwist |
May 04, 2022 |
168 |
- |
| Automate security testing in your CI pipelines with GitGuardian and CircleCI |
Ziad Ghalleb |
Apr 28, 2022 |
422 |
- |
| Detector of The Month – Stripe webhook secret, April 2022 |
Ziad Ghalleb |
Apr 27, 2022 |
520 |
- |
| How To Setup Your Jenkins Pipeline with GitGuardian in Kubernetes |
Guest Expert |
Apr 22, 2022 |
1467 |
- |
| How Hackers Used Stolen GitHub Tokens to Access Private Source Code |
Mackenzie Jackson |
Apr 20, 2022 |
700 |
- |
| Carrying Ambition Through Passion |
Thomas Segura |
Apr 19, 2022 |
1095 |
- |
| Investigating, prioritizing, and remediating thousands of hardcoded secrets incidents |
Ziad Ghalleb |
Apr 13, 2022 |
1215 |
- |
| Compromising CI/CD Pipelines with Leaked Credentials [Security Zines] |
Thomas Segura |
Apr 11, 2022 |
327 |
- |
| 9 Extraordinary Terraform Best Practices That Will Change Your Infra World |
Guest Expert |
Apr 06, 2022 |
3117 |
- |
| Securing Containers with Seccomp: Part 2 |
Guest Expert |
Apr 01, 2022 |
2052 |
3 |
| Detector of The Month – Redis, March 2022 |
Ziad Ghalleb |
Mar 31, 2022 |
646 |
- |
| DevSecOps and the AppSec Shared Responsibility Model |
Thomas Segura |
Mar 28, 2022 |
464 |
- |
| Latest from Lapsus$, Reviewing the Microsoft Breach |
Mackenzie Jackson |
Mar 25, 2022 |
998 |
- |
| Secrets in Git Repos [Security Zines] |
Ziad Ghalleb |
Mar 16, 2022 |
715 |
- |
| Securing Containers with Seccomp: Part 1 |
Guest Expert |
Mar 14, 2022 |
1559 |
- |
| Samsung and Nvidia are the latest companies to involuntarily go open-source leaking company secrets |
Mackenzie Jackson |
Mar 09, 2022 |
735 |
- |
| The State of Secrets Sprawl 2022 |
Thomas Segura |
Mar 02, 2022 |
450 |
- |
| GitGuardian enters the FT120! |
Carole Winqwist |
Mar 01, 2022 |
189 |
- |
| Detector of The Month – PlanetScale, February 2022 |
Ziad Ghalleb |
Feb 28, 2022 |
698 |
- |
| Security Chats - Don Magee, Security Engineer at a tech services company |
Carole Winqwist |
Feb 25, 2022 |
451 |
- |
| Kubernetes Hardening Tutorial Part 3: Authn, Authz, Logging & Auditing |
Guest Expert |
Feb 23, 2022 |
2061 |
2 |
| No stone left unturned: detecting custom patterns is now available in GitGuardian. |
Ziad Ghalleb |
Feb 16, 2022 |
495 |
- |
| Security Chats - Abbas, Head of Infosec at a tech services company |
Carole Winqwist |
Feb 09, 2022 |
321 |
- |
| Mackenzie Jackson, GitGuardian: “code security needs to be a layered approach” |
Mackenzie Jackson |
Feb 09, 2022 |
1219 |
- |
| Documentation as a Killer Feature |
Thomas Segura |
Feb 07, 2022 |
728 |
- |
| Detector of The Month – Datadog, January 2022 |
Ziad Ghalleb |
Jan 31, 2022 |
850 |
- |
| GitGuardian is a proud sponsor of OWASP |
Mackenzie Jackson |
Jan 31, 2022 |
755 |
- |
| GitGuardian is now SOC 2 Type I compliant |
Carole Winqwist |
Jan 26, 2022 |
221 |
- |
| Data Breach: a 5 Steps Response Plan |
Guest Expert |
Jan 21, 2022 |
1689 |
2 |
| Security Chats - Blake, DevSecOps Engineer at a large computer software company |
Carole Winqwist |
Jan 19, 2022 |
309 |
- |
| Infrastructure as Code - Everything You Need to Know |
Guest Expert |
Jan 14, 2022 |
1976 |
- |
| AppSec 2022 Resolutions: find inspiration in this report from Gartner on mitigating software supply chain security threats |
Ziad Ghalleb |
Jan 13, 2022 |
318 |
- |
| Security Chats - Andy, Senior Security Engineer at an insurance company |
Carole Winqwist |
Jan 11, 2022 |
373 |
- |
| CI Pipelines: 5 Risks to Assess |
Guest Expert |
Jan 07, 2022 |
1606 |
- |
| Kubernetes Hardening Tutorial Part 2: Network |
Guest Expert |
Jan 05, 2022 |
1932 |
2 |
| Security Chats - Igor, Director of Development at a large computer software company |
Carole Winqwist |
Jan 02, 2022 |
304 |
- |
| Implementing a Secrets Detection Program for the Enterprise – a case study |
Ziad Ghalleb |
Jul 07, 2022 |
1074 |
- |
| OWASP AppSec Days France 2025: Learning To Defend The Global Supply Chain Together |
Dwayne McDaniel |
Sep 26, 2025 |
1463 |
- |
| Terraform Secrets Management Best Practices: Secret Managers and Ephemeral Resources |
Tiexin Guo |
Oct 09, 2025 |
2195 |
- |
| GitGuardian Introduces One-Click Secret Revocation to Accelerate Incident Response |
Soujanya Ain |
Sep 23, 2025 |
1202 |
- |
| How to Use NHI Governance as Your Central Dashboard to Monitor AWS IAM |
Tiexin Guo |
Sep 29, 2025 |
1295 |
- |
| SREday SF 2025: Human Centered SRE In An AI World |
Dwayne McDaniel |
Oct 13, 2025 |
1662 |
- |
| Red Hat GitLab Data Breach: The Crimson Collective's Attack |
Guillaume Valadon, Carole Winqwist |
Oct 03, 2025 |
1705 |
- |
| The GhostAction Campaign: 3,325 Secrets Stolen Through Compromised GitHub Workflows |
Gaetan Ferry, Guillaume Valadon |
Sep 05, 2025 |
1497 |
- |
| Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT |
Dwayne McDaniel |
Sep 19, 2025 |
1583 |
- |
| Shai-Hulud: A Persistent Secret Leaking Campaign |
Gaetan Ferry |
Sep 16, 2025 |
852 |
- |
| When Google Says "Scan for Secrets": A Complete Guide to Finding Hidden Credentials in Salesforce |
Guillaume Valadon |
Sep 03, 2025 |
879 |
- |
| DevOps Days Philadelphia 2025: Security As A Control Loop, Resilience, Runtime Risks, And How AI Is Changing It |
Dwayne McDaniel |
Oct 06, 2025 |
1507 |
- |
| GitHub Copilot Security and Privacy Concerns: Understanding the Risks and Best Practices |
Dwayne McDaniel |
Mar 27, 2025 |
2041 |
- |
| How Cybercriminal Organizations Weaponize Exposed Secrets |
Guillaume Valadon, Gaetan Ferry |
Oct 10, 2025 |
693 |
- |
| Security Lessons For All From GitHub's Hardened Package Publication For npm |
Dwayne McDaniel |
Oct 02, 2025 |
1435 |
- |
| Detect Secrets in GitLab CI Logs using ggshield and Bring Your Own Source |
Philippe Gablain, Soujanya Ain |
Sep 17, 2025 |
1602 |
- |
| INCYBER Forum Canada 2025: Collaboration Wins Over Compliance |
Dwayne McDaniel |
Oct 21, 2025 |
1540 |
- |
| The State of Secrets Sprawl 2025 |
Soujanya Ain |
Mar 11, 2025 |
734 |
- |
| Rethinking Security Resilience And Getting Back To Basics At CornCon 11 |
Dwayne McDaniel |
Oct 16, 2025 |
1638 |
- |
| Building Chromegg: A Chrome Extension for Real-Time Secret Detection |
Andy Rea |
Oct 20, 2025 |
1319 |
- |
| OAuth for MCP - Emerging Enterprise Patterns for Agent Authorization |
Thomas Segura |
Oct 17, 2025 |
2901 |
- |
| From Path Traversal to Supply Chain Compromise: Breaking MCP Server Hosting |
Gaetan Ferry |
Oct 22, 2025 |
2208 |
- |
| Scanning GitHub Gists for Secrets with Bring Your Own Source |
Anna Nabiullina, Romain Jouhannet |
Oct 27, 2025 |
1167 |
- |
| LASCON XV: From AI Risk To Identity Security In AppSec |
Dwayne McDaniel |
Oct 29, 2025 |
1391 |
- |
| The Hidden Cost of Secrets Sprawl |
Soujanya Ain |
Oct 30, 2025 |
1713 |
- |
| Working Towards Improved PAM: Widening The Scope And Taking Control |
Dwayne McDaniel |
Oct 31, 2025 |
1271 |
- |
| Identity Architecture Now Drives Cyber Risk: Techno Security & Digital Forensics Conference West 2025 |
Dwayne McDaniel |
Nov 04, 2025 |
1464 |
- |
| BSides Chicago 2025: Operationalizing Identity Risk In Cloud-Native Environments |
Dwayne McDaniel |
Nov 06, 2025 |
1636 |
- |
| Q3 2025: NHI Security Gets More Real |
Soujanya Ain |
Nov 11, 2025 |
1533 |
- |
| Queen City Con 0x3: Hacking And Embracing Resiliency |
Dwayne McDaniel |
Nov 12, 2025 |
1675 |
- |
| API Key Security: 7 Enterprise-Proven Methods to Prevent Costly Data Breaches |
Tiexin Guo |
Nov 14, 2025 |
2297 |
- |
| Trust Beyond Containers: Identity and Agent Security Lessons from KubeCon 2025 |
Dwayne McDaniel |
Nov 20, 2025 |
1925 |
- |
| Workload And Agentic Identity at Scale: Insights From CyberArk's Workload Identity Day Zero |
Dwayne McDaniel |
Nov 21, 2025 |
1256 |
- |
| OWASP Top 10 2025 Updates: Supply Chain, Secrets, And Misconfigurations Take Center Stage |
Dwayne McDaniel |
Nov 24, 2025 |
1287 |
- |
| Shai-Hulud 2.0: the supply chain attack that learned |
Guillaume Valadon, Gaetan Ferry |
Nov 24, 2025 |
862 |
- |
| How Machine Learning Transforms Security Alert Chaos into Actionable Intelligence |
Soujanya Ain, Alexandre Pradeilles |
Nov 28, 2025 |
947 |
- |
| A Complete Guide to Transport Layer Security (TLS) Authentication |
Tiexin Guo |
Nov 25, 2025 |
3875 |
- |
| Mutual TLS (mTLS) Authentication - A Complete Guide |
Tiexin Guo |
Dec 02, 2025 |
3682 |
- |
| Lessons in Testing, Performance, and Legacy Systems from /dev/mtl 2025 |
Dwayne McDaniel |
Dec 03, 2025 |
1637 |
- |
| How Orange Business Transformed Secrets Security with a Prevention-First Approach |
Soujanya Ain |
Dec 04, 2025 |
1729 |
- |
| From Detection to Defense: How Push-to-Vault Supercharges Secrets Management for DevSecOps |
Dwayne McDaniel |
Dec 05, 2025 |
1647 |
- |
| OIDC for Developers: Reasons Your Auth Integration Could Be Broken |
Thomas Segura |
Dec 11, 2025 |
2135 |
- |
| How To Use ggshield To Avoid Hardcoded Secrets [cheat sheet included] |
Dwayne McDaniel |
Dec 10, 2025 |
2574 |
- |