GitGuardian Blog – Code Security for the DevOps generation
A blog for developers, security engineers, and other cybersecurity professionals to learn about secrets and code security, DevSecOps, Infra-as-Code and much more.

GitGuardian Joins Health-ISAC: Strengthening Cybersecurity in Healthcare Through Secrets Detection
As cyber threats in healthcare continue to evolve, GitGuardian strengthens its commitment to the sector by joining Health-ISAC and offering members enhanced secrets detection capabilities to protect sensitive data ...

Introducing ggscout: Unified Visibility and Detection for Your Vaulted Secrets
Change your Secrets Game with ggscout, your secrets manager's manager. Gain unprecedented visibility and control over your secrets managers. Secure your vaults, prevent leaks, and achieve proactive secrets governance ...

Secrets Sprawl and AI: Why Your Non-Human Identities Need Attention Before You Deploy That LLM
Your RAG implementation can expose secrets in some unexpected ways. Secure your LLM deployments and scrub knowledge bases to prevent your secrets from leaking ...

ATLSecCon 2025: Security Readiness Means Human Readiness
LLMs won’t fix a broken SOC, but apprenticeship might. ATLSecCon 2025 revealed how outdated hiring and cultural gatekeeping are breaking cybersecurity from the inside out ...

GitGuardian Launches NHI Governance to Secure Non-Human Identities and Their Secrets for Enterprises
Secrets sprawl is a growing cybersecurity challenge, especially with NHIs. GitGuardian's new NHI Governance product offers centralized inventory and lifecycle management to help enterprises regain control over their secrets and prevent costly ...

A Security Leader’s Perspective on The Real Business Risks of Secrets Managers Redundancy
Redundancy in secrets management introduces risks, as well as operational complexity, ultimately undermining overall security maturity ...

AI Is the New Trust Boundary: STL TechWeek Reveals the Risk Shift
At St. Louis TechWeek 2025, AI took center stage as industry thought leaders shared sessions warning about inputs, data health, and how agents are the new attack surface ...

How to Handle Secrets in Docker
DevOps engineers must handle secrets with care. In this series, we summarize best practices for leveraging secrets with your everyday tools ...

From Alert to Action: Best Practices to Handle Responsible Disclosure
Responsible disclosure is an often overlooked but critical component of cybersecurity alerting processes. Explore key best practices that can enhance communication and collaboration with researchers, turning potential security threats into opportunities for ...

BSides San Diego 2025: Shifting the Risk Conversation By The Sea Shore
Discover how BSidesSD 2025 challenged traditional GRC, spotlighted data poisoning, and promoted human-driven security insights. Read our highlights from this community event ...