Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Become The Master Of Disaster: Disaster Recovery Plan for DevOps

Ensuring business continuity requires more than just robust pipelines and agile practices in DevOps. A well-designed Disaster Recovery Plan is critical to mitigate risks, recover swiftly from failures, and ensure your data and infrastructure integrity. Contents hide 1 Are there any myths related to DR in DevOps?

Introducing The New GitGuardian Workspace Sidebar Navigation

We're updating your GitGuardian Workspace user interface, introducing a new sideba experience to make it even easier to navigate and take advantage of our secrets detection platform. We look forward to you using the updated GitGuardian UI to help eliminate secrets sprawl in your organization.

How to secure every stage of the CI/CD pipeline with Sysdig

Securing operations in the cloud can seem daunting. To protect your organization, you need to have the proper preventative and reactive safeguards in place at every step of the software development cycle. But it doesn’t have to be as complex as it sounds. This blog outlines how to secure the entire software development lifecycle, emphasizing the “shift left” approach, which aims to catch vulnerabilities and issues early in the development process to reduce both risks and costs.

Introducing GitGuardian's New Auto-ignore False Positive Playbook

We are proud to announce our new Auto-ignore false positive playbook. We've added this new automated Playbook to the GitGuardian Secret Detection platform to eliminate false positives from your incident queue and help you focus on actionable alerts. In the summer of 2024, we released FP remover, our internal machine learning model, that can significantly reduce false positives by understanding code context and semantics. In our testing it eliminates up to 80% of false positives.

Securing Infrastructure Access at Scale in Large Enterprises

The complexity and scale of computing infrastructure has exploded in recent years. In larger organizations, managing access, identities, and policies for people and machines to securely access diverse infrastructure resources – such as physical machines and servers, clouds, software apps, services, APIs – is a daunting task. The larger the organization, the more costly and difficult it becomes to wrangle the complexity of this infrastructure in a way that is secure, efficient, and resilient.

How to Enable Hardened UNC Path

Hardened UNC Path is a Group Policy Object present at: This policy can be applied to the systems that are joined via the domain and it is not applicable for standalone systems. To get secure access to the UNC paths this policy must be configured. The recommended state for this policy is: Enabled, there are some pre-requisites.