Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

December 2022

[Webinar] Exposing Leaked Secrets Inside Android Apps! Cybernews & GitGuardian

Our Friends at Cybernews recently released some shocking research that showed thousands of Android applications are leaking hard-coded secrets like API keys. We are super excited to be sitting down with Cybernews researcher Vincentas Baubonis to take a deep dive into this study and uncover why this is such a pervasive vulnerability in Android Applications.

GitGuardian Public Monitoring demo - protect your attack surface on GitHub

GitGuardian scans GitHub round the clock for companies' exposed secrets and alerts their security teams before it’s too late. This short demo shows exactly how GitGuardian's Public Monitoring platform can help you identify your developers on GitHub, even when using personal accounts, monitor your perimeter for secrets leaks, and help you collaborate with developers to remediate exposure.

Remediating Incidents with GitGuardian

Unfortunately, sometimes secrets get hard coded, committed, and pushed to your shared repositories. Do you know what to do when an incident occurs? In this high-level overview, we will walk you through the incident remediation process while leveraging the GitGuardian internal monitoring platform. This video covers: Definitions How to prioritize incidents How to investigate incidents and finally, an overview of the needed steps to remedy issues

GitGuardian Playbooks Overview

GitGuardian Playbooks allow you to quickly and easily automate your incident responses. GitGuardian is proud to offer 3 different playbooks designed to get your team involved in remediating incidents: We would be happy to work with you to create custom playbooks as well. Don't hesitate to reach out to us at contact@gitguardian.com.

[Webinar] Taming Secrets Sprawl with Doppler and GitGuardian

With every hardcoded secret, the software supply chain attack surface grows larger, opening more avenues for the resourceful attacker. Remember Codecov? It all started with a hardcoded secret, ultimately leading to the downstream poisoning of 20,000+ CI pipelines and the exfiltration of more secrets than attackers could ever dream of. It’s time for us, developers and security pros, to take a hard look at our hardcoded secrets – or else, we accept living with the risks and consequences of secrets sprawl.