Syndicated Blog

GitGuardian Blog – Code Security for the DevOps generation
A blog for developers, security engineers, and other cybersecurity professionals to learn about secrets and code security, DevSecOps, Infra-as-Code and much more.
GitGuardian Joins Health-ISAC: Strengthening Cybersecurity in Healthcare Through Secrets Detection

GitGuardian Joins Health-ISAC: Strengthening Cybersecurity in Healthcare Through Secrets Detection

| | GitGuardian
As cyber threats in healthcare continue to evolve, GitGuardian strengthens its commitment to the sector by joining Health-ISAC and offering members enhanced secrets detection capabilities to protect sensitive data ...
Introducing ggscout: Unified Visibility and Detection for Your Vaulted Secrets

Introducing ggscout: Unified Visibility and Detection for Your Vaulted Secrets

| | Secrets Management
Change your Secrets Game with ggscout, your secrets manager's manager. Gain unprecedented visibility and control over your secrets managers. Secure your vaults, prevent leaks, and achieve proactive secrets governance ...
The Risks of RAG: Secrets Sprawl in Systems Using Retrieval Augmented Generation

Secrets Sprawl and AI: Why Your Non-Human Identities Need Attention Before You Deploy That LLM

Your RAG implementation can expose secrets in some unexpected ways. Secure your LLM deployments and scrub knowledge bases to prevent your secrets from leaking ...
ATLSecCon 2025: Security Readiness Means Human Readiness

ATLSecCon 2025: Security Readiness Means Human Readiness

| | Conferences
LLMs won’t fix a broken SOC, but apprenticeship might. ATLSecCon 2025 revealed how outdated hiring and cultural gatekeeping are breaking cybersecurity from the inside out ...
GitGuardian Launches NHI Governance to Secure Non-Human Identities and Their Secrets for Enterprises

GitGuardian Launches NHI Governance to Secure Non-Human Identities and Their Secrets for Enterprises

| | Product News
Secrets sprawl is a growing cybersecurity challenge, especially with NHIs. GitGuardian's new NHI Governance product offers centralized inventory and lifecycle management to help enterprises regain control over their secrets and prevent costly ...
A Security Leader’s Perspective on The Real Business Risks of Secrets Managers Redundancy

A Security Leader’s Perspective on The Real Business Risks of Secrets Managers Redundancy

Redundancy in secrets management introduces risks, as well as operational complexity, ultimately undermining overall security maturity ...
AI Is the New Trust Boundary: STL TechWeek Reveals the Risk Shift

AI Is the New Trust Boundary: STL TechWeek Reveals the Risk Shift

| | Conferences
At St. Louis TechWeek 2025, AI took center stage as industry thought leaders shared sessions warning about inputs, data health, and how agents are the new attack surface ...
How to Handle Secrets in Docker

How to Handle Secrets in Docker

| | Best Practices
DevOps engineers must handle secrets with care. In this series, we summarize best practices for leveraging secrets with your everyday tools ...
From Alert to Action: Best Practices to Handle Responsible Disclosure

From Alert to Action: Best Practices to Handle Responsible Disclosure

|
Responsible disclosure is an often overlooked but critical component of cybersecurity alerting processes. Explore key best practices that can enhance communication and collaboration with researchers, turning potential security threats into opportunities for ...
BSides San Diego 2025: Shifting the Risk Conversation By The Sea Shore

BSides San Diego 2025: Shifting the Risk Conversation By The Sea Shore

| | Conferences
Discover how BSidesSD 2025 challenged traditional GRC, spotlighted data poisoning, and promoted human-driven security insights. Read our highlights from this community event ...