Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Explore ggshield commands (quota and config basics)

What ggshield commands are available? First is quota, which checks how many API calls you have remaining for your GitGuardian workspace: ggshield quota As a rule of thumb, Starter plans include 10,000 API calls per month, and Business and Enterprise plans start at 100,000 calls per month. Next is config, which acts like the CLI control panel. ggshield uses YAML configuration to define how the CLI behaves, and you can tune it per repository.

Joomla SAML SSO with Microsoft Entra ID (Azure AD) | Step-by-Step Setup Guide

Learn how to configure SAML Single Sign On (SSO) in Joomla using Microsoft Entra ID (formerly Azure Active Directory). In this step-by-step tutorial, we show how to connect your Joomla site as a SAML Service Provider (SP) with Microsoft Entra ID, enabling users to securely log in using their corporate credentials. What you will learn in this video: Creating and configuring a SAML application in Entra ID Setting up the Joomla SAML SP plugin Exchanging metadata between Joomla and Entra ID Configuring attribute mapping.

Asymmetric Data: The New Challenge for API Security

Asymmetric Data: The New Challenge for API Security In this A10 Networks video, "APIs are the Language of AI: Protecting Them is Critical," security experts Jamison Utter and Carlo Alpuerto discuss the unique challenges of securing AI-driven data exchanges. Unlike traditional API interactions—where a request for a video clearly results in a video—AI interactions are defined by a "phenomenal" level of asymmetry. A tiny text request can trigger a massive, unpredictable response, making traditional security prediction models nearly obsolete.

2025 Predictions for the Future of Cybersecurity with all our guests [279]

On this episode of The Cybersecurity Defenders Podcast, we revisit the 2025 predictions shared by our guests throughout the year. From attackers and defenders to AI and the broader security industry, these forecasts capture what experts expected was coming next. Rather than judging accuracy - which is still too early to assess - we're examining the predictions themselves: where they aligned, how they clustered, and what those patterns reveal about the industry’s mindset as this year came to a close. Free from hindsight bias, this episode explores what remained uncertain as we entered 2026.

2025 Ends With a Bang - The 443 - Episode 352

This week on the podcast, we cover a wave of attacks against network edge equipment and internet-exposed systems including an update on the recently patched Firebox 0-Day. After that, we cover two stories on browser extensions siphoning off data and making unwanted modifications to victim’s web browsing activity.

From Finding to Fix: Remediation Orchestration When Asset Ownership Is Missing

Security teams don’t struggle to find issues. They struggle to move them forward. In this use case demo, we show how remediation coordination breaks down when assets have no clear owner, and how remediation orchestration restores accountability across teams, tools, and environments. You’ll see how security teams can move beyond manual handoffs, Slack messages, and guesswork by orchestrating remediation across teams, even when ownership is unclear or spans multiple domains.