git
Three Mechanisms to Protect Your Git Repositories
...despite all intentions to follow best practices, they don't. When you automate enforcement of best practices, you can ensure those practices are followed ...
‘Extremely serious’ — Mercedes-Benz Leaks Data on GitHub
Oh, Lord: My friends all hack Porsches—I must make amends ...
How to scan for cybersecurity risks on every commit with CodeSec & Git Hooks
Good programmers are lazy ...
How GitOps Raises the Stakes for Application Security
The rise of GitOps comes from the industry’s increased adoption of Kubernetes. As organizations and teams shift towards Kubernetes, scaling their cluster management practices becomes imperative as teams and workloads grow in ...
Dev + Sec + Ops != DevSecOps
Dev + Sec + Ops ! = DevSecOpsDevSecOps formulaHistorically, security vendors and code scientists around the world have been looking for a single universal formula to represent the notion of DevSecOps.In my ...
Git Code Repos Held to Ransom – Thousands Hacked
Many private Git repositories are at risk of being leaked to the public. Anonymous hackers have wiped the code and are demanding Bitcoin. Or else they’ll open-source it for you. And then ...
Study: Most Home Routers Have Unpatched Vulnerabilities
A study performed by the non-profit American Consumer Institute (ACI) Center for Citizen Research revealed that the majority of home routers have tens of known vulnerabilities. For its research, the ACI used ...
Git Vulnerability Leads to Remote Code Execution
A new version of the widely used Git version control system fixes a vulnerability that allows malicious code repositories to execute code on client computers when being cloned. Originally created for Linux ...