Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Introducing The New GitGuardian Workspace Sidebar Navigation

We're updating your GitGuardian Workspace user interface, introducing a new sideba experience to make it even easier to navigate and take advantage of our secrets detection platform. We look forward to you using the updated GitGuardian UI to help eliminate secrets sprawl in your organization.

How to secure every stage of the CI/CD pipeline with Sysdig

Securing operations in the cloud can seem daunting. To protect your organization, you need to have the proper preventative and reactive safeguards in place at every step of the software development cycle. But it doesn’t have to be as complex as it sounds. This blog outlines how to secure the entire software development lifecycle, emphasizing the “shift left” approach, which aims to catch vulnerabilities and issues early in the development process to reduce both risks and costs.

Introducing GitGuardian's New Auto-ignore False Positive Playbook

We are proud to announce our new Auto-ignore false positive playbook. We've added this new automated Playbook to the GitGuardian Secret Detection platform to eliminate false positives from your incident queue and help you focus on actionable alerts. In the summer of 2024, we released FP remover, our internal machine learning model, that can significantly reduce false positives by understanding code context and semantics. In our testing it eliminates up to 80% of false positives.

Securing Infrastructure Access at Scale in Large Enterprises

The complexity and scale of computing infrastructure has exploded in recent years. In larger organizations, managing access, identities, and policies for people and machines to securely access diverse infrastructure resources – such as physical machines and servers, clouds, software apps, services, APIs – is a daunting task. The larger the organization, the more costly and difficult it becomes to wrangle the complexity of this infrastructure in a way that is secure, efficient, and resilient.

How to Enable Hardened UNC Path

Hardened UNC Path is a Group Policy Object present at: This policy can be applied to the systems that are joined via the domain and it is not applicable for standalone systems. To get secure access to the UNC paths this policy must be configured. The recommended state for this policy is: Enabled, there are some pre-requisites.

Application Security 101: A Guide for Developers

Most developers and companies believe their applications to be secure and understand the importance of security. However, year after year, they continue to push vulnerable code into production... In order to avoid these pitfalls and improve the overall security of our applications, we need to understand what application security (or AppSec) is all about. In this video, you will learn what application security is, why it's important and what you can do to keep your applications secure.

The Real Cost of DevOps Backup Scripts

Backups can act as a safety net for DevOps. They help to keep important data safe and ensure smooth workflow and business resilience in the midst of a disaster. However, which backup method is the most efficient one? There are different options for backing up your DevOps stack which range from basic scripts put together by internal IT teams to advanced solutions provided by professional backup vendors.