Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Prioritizing Your GitGuardian Incidents

In this video, you will learn how to cut through the noise and prioritize your GitGuardian incidents with confidence. From understanding incident fields to using filters, views, and severity scoring, this walkthrough shows you exactly how to focus on what matters most. Take control of your backlog and streamline remediation to strengthen your team’s security posture. Chapters.

Linux Version 6.17 - Pre-Release Preview from a Security Perspective

Linux kernel v6.17 is on the horizon (expected release by the end of September 2025 – Canonical said to release 25.10 with the new kernel in early October), and it brings some interesting security-focused improvements. This release continues Linux’s trend of hardening the kernel against both hardware-level vulnerabilities and general attack vectors, while refining security subsystems for better performance and maintainability.

NPM Ecosystem Under Siege: Self-Propagating Malware Compromises 187 Packages in a Huge Supply Chain Attack

The NPM ecosystem has been rocked by one of its widest supply chain attacks to date, with over 187 popular packages compromised by advanced malware capable of self-propagation and automated credential harvesting. This attack, affecting packages with millions of weekly downloads including angulartics2, ngx-toastr, and @ctrl/tinycolor, demonstrates how cybercriminals are evolving their tactics to create “worm-like” malware that can autonomously spread across the software supply chain.

Where to Get a Complimentary Domain Name with Web Hosting

A presence online is essential today. Websites are your virtual shopfront. Many people have dreams of creating an online presence. Cost can cause some to be reluctant. There are solutions to overcome this. It is possible to get a free domain name with hosting. This will make the beginning of your journey considerably more simple. It eliminates a major initial barrier.

You Built Your Own Certificate Management System - It's Already Broken

You were tired of renewing all those certificates, and Certbot looked so easy. Now you have scripts thousands of lines long filled with command line incantations you have to Google every time you open it. The script is running on all the critical servers. And some of the printers. If someone looks at it the wrong way, a certificate expires.

Working With GitGuardian Playbooks To Automate Your Workflows

In this video, we'll cover GitGuardian Playbooks and how to manage them in your workspace. We know that time is critical when a secrets incident occurs. That's why our platform allows you to quickly and easily automate steps of the incident response process. We call these automations "Playbooks".

You Won't Believe These Results from Replit

In this video, we put Replit’s AI coding tool to the test by asking it to create a secure note-taking app. While the tool shows off some seriously impressive abilities, it’s not without its flaws... Join me as I explore what Replit can (and can’t) do, and whether AI coding tools such as this one are ready to build reliable, secure apps.

4 Ways to Secure Bedrock Agent-Initiated Actions with Teleport

AI agents powered by Amazon Bedrock are playing an increasingly central role in cloud operations. These agents can interact directly with core AWS services like S3, Lambda, RDS, and EC2 to perform tasks such as data retrieval, automation orchestration, and resource provisioning. Many teams rely on the Model Context Protocol (MCP) to structure agent behavior and convert natural language into actionable commands.