Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Integrate Bitbucket Cloud With GitGuardian's Secrets Detection Platform Now Supports

We are proud to announce that BitBucket Cloud users can now leverage the GitGuardian Secrets Detection platform to find hardcoded secrets throughout their existing codebases and actively monitor any code changes for newly leaked credentials. We have supported Bitbucket Data Center and Sever for years, but now, teams managing code on bitbucket.org can reap those same benefits. Integration is very simple and straightforward.

Integrate Jira Data Center With GitGuardian For Real-Time Secrets Detection

We are excited to announce that Jira Data Center users can now leverage GitGuardian to perform real-time scanning for secrets in issues and comments. We have supported Jira Cloud with real-time scanning for some time, but now teams that run their own private versions of the popular project management tool, helping teams plan, track, and release work. You can install GitGuardian on multiple Jira Data Center sites to monitor your projects.

SOAR into 2025: SOAR's evolving role in security and beyond

Security Orchestration, Automation, and Response (SOAR) is rapidly evolving to meet the demands of modern security teams. As organizations face increasing threats and complexity, choosing the right SOAR solution has never been more critical. Join Matt Muller, Field CISO at Tines, and Andrew Green, Networking & Security Research Analyst at GigaOm, for an in-depth discussion on the state of the SOAR market and what’s next for security automation.

How Yahoo Scaled Application Security & Saved Millions with Mend.io

Join Chris Madden, Distinguished Technical Security Engineer at Yahoo, as he shares how Yahoo scaled its application security program with Mend.io. In this insightful video, Chris details the challenges Yahoo faced in managing open source security and compliance risks, and how Mend.io's AppSec platform helped them: Discover how Mend.io enabled Yahoo to address critical vulnerabilities like Log4Shell, codify security policies, and achieve quantifiable benefits across their organization. If you're looking to improve your AppSec posture, especially at enterprise scale, this video is a must-watch!

Neo4j: Building a Secure Future with Sysdig CNAPP

Discover how Neo4j, the world’s leading graph database company, collaborates with Sysdig to reduce its risk in the cloud. From streamlining vulnerability management to building a trusted partnership, this video explores the transformative impact of Sysdig on Neo4j’s security operations. Speakers featured in this video: David Fox, CISO Fredrik Clementson, Senior Director of Engineering Preeti Preeti, Security Analyst.

Why You Can't 'Opt Out' of Cyber Policy #shorts #datasecuritydecoded #podcast

Public Policy Moves Forward With or Without You Waiting for your preferred party to take power before engaging in cyber policy isn't just ineffective – it's a missed opportunity to shape critical decisions that affect everyone. Public policy continues to evolve regardless of who holds office, and the cybersecurity landscape waits for no one.

Data Security's Low Hanging Fruit: Redundant, Obsolete, and Trivial Data

In this episode of Into the Breach, James Purvis and Drew Russell tackle the growing issue of ROT data - redundant, obsolete, and trivial data - and its impact on both security and costs. They discuss how CISOs can achieve a win-win by reducing risk and hard costs through effective data management. From cloud migration to legal implications, they explore practical strategies to identify, manage, and eliminate ROT data for a more efficient and secure organization.