A Quick Overview of the Digital Operational Resilience Act (DORA)

A Quick Overview of the Digital Operational Resilience Act (DORA)

| | Frameworks & Regulations
Get insights into the EU's Digital Operational Resilience Act (DORA) and its impact on cybersecurity compliance for financial sector companies and their critical contractors ... Read More
Let's Be Careful Out There | 'Hill Street Blues' Supercut

Five Ways Your CI/CD Pipeline Can Be Exploited

| | DevSecOps, Engineering
CI/CD pipelines can be exploited in a number of ways and we're going to share a few with you ... Read More
Three Tips To Use AI Securely at Work

Three Tips To Use AI Securely at Work

How can developers use AI securely in their tooling and processes, software, and in general? Is AI a friend or foe? Read on to find out ... Read More
Creating a .gitignore file - How we can use git ignore to prevent adding unwanted files to git

Secure Your Secrets with .env

| | Best Practices, DevSecOps
Using environment variables to store secrets instead of writing them directly into your code is one of the quickest and easiest ways to add a layer of protection to your projects ... Read More
Ethical Hacking Q&A

Ethical Hacking Q&A with Sonya Moisset

| | Tutorials
Join Mackenzie Jackson and Sonya Moisset for an eye-opening discussion about Ethical Hacking as Sonya answers questions from Mack and the webinar audience ... Read More
Hands-on guide to Runtime Security for CI/CD Pipelines with StepSecurity

Webinar Recap: Hands-on guide to Runtime Security for CI/CD Pipelines with StepSecurity

A condensed recap of our hands-on runtime security webinar from September. Get the juiciest knowledge nuggets and pointers to more ... Read More
We’ve Got Badges! Yes We Do! We’ve Got 18 From G2!

We’ve Got Badges! Yes We Do! We’ve Got 18 From G2!

| | Company News
GitGuardian scored a whopping eighteen G2 badges for Fall 2023, including Leader badges in two categories. Read on for details ... Read More