Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Git

GitHub's Push Protection: Enhancing Open-Source Security with Limitations to Consider

GitHub's Push Protection is now free for all public repositories, a significant milestone for open-source security! Find out the key points you need to keep in mind before using it to safeguard your code repositories.

How to Secure Your CI/CD Pipelines with GitGuardian Honeytokens

Discover how honeytokens, digital decoys designed to detect unauthorized access, can strengthen the security of your CI/CD pipelines. In this guide, we offer step-by-step instructions for integrating them into popular pipelines like Jenkins, GitLab, and AWS CodePipeline.

How do you manage secrets (Credentials) in an organisation - Expert panel

In this video a panel of experts discuss how to create an effective secrets management program and what are the challenges large organisations face when trying to combat security issues like secrets sprawl. The discussion is with between: Mackenzie Jackson from GitGuardian James Governor, Co-founder & Analyst at RedMonk Andrei Predoiu, DevOps Engineer at Bestseller Mike Carey, Senior Product Manager at 1Password.

Code delivery in a DevSecOps way through automation and security - GitProtect & Mergify

Fewer engineers, more and more updates and milestones, competition velocity... - all of this makes DevSecOps seem complicated and costly. While security might be considered a bottleneck to faster releases, growing cyber threats and developers' mistakes makes it much too risky to minimize or ignore. In this webinar recording experts from GitProtect and Mergify join forces to prove to you that code delivery in a DevSecOps way doesn't have to be complicated 🚀

Cloud Threats Memo: Threat Actors Continue to Exploit the Flexibility of GitHub for Malicious Purposes

Dark Pink (also known as Saaiwc Group) is an advanced threat actor that has been operating since mid-2021, mainly in the Asia-Pacific region and to a lesser extent in Europe, leveraging a range of sophisticated custom tools within a sophisticated kill chain relying on spear-phishing emails. The group has been quite active since 2021, attacking at least 13 organizations in Vietnam, Bosnia and Herzegovina, Cambodia, Indonesia, Malaysia, Philippines, Belgium, Thailand, and Brunei.