Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Unveiling Jedi: Navigating the Power and Pitfalls with Critical Baggage || Razorthorn Security

In the realm of using Jedi, there's a crucial aspect to consider – the level of critical baggage required for effective utilization. It's not just about diving in; it's about understanding the nuances and not blindly trusting the results. This is a pitfall in the industry, where some see Jedi tools as a way to be blissfully ignorant of the facts they query. Many trust it implicitly, assuming that with the power of Jedi, the answers must be indisputable. However, it's essential to recognize that the responses are a foundation, a starting point that demands further exploration.

Have Your Secrets Leaked? It's time to find out!

We understand the struggle of securing sensitive data—API tokens, cloud credentials, and database URLs have a knack for slipping into the public eye, be it in code repositories, CI job logs, or unexpected corners like Jira tickets. We've been championing this cause since 2017, scouring over a billion public GitHub commits last year alone and uncovering a staggering 10 million in 2022. We've gone beyond reports, beyond thought leadership, to unveil a real solution: HasMySecretLeaked!

Unlocking Deep Thought: Navigating the Art of Asking for the Right Answers || Razorthorn Security

Ever felt like you're channeling your inner Deep Thought from Hitchhiker's Guide when seeking answers? Join me on a journey where we explore the art of asking the right questions. It's not just about syntax; it's about unlocking the profound. In this video, I delve into my experiences, including trying out tools like Dary with mixed results. Discover the importance of framing your queries and uncovering the true question behind what you seek.

Unveiling the Chaos: Navigating the Security Nightmare in Modern DevOps and CI/CD Environments

Dive deep into the tumultuous world of modern software development in our latest video, where we unravel the complexities and security pitfalls of CI/CD, DevOps, and DevSecOps. Many believe they've fortified their tools, boasting secure Ansible, Jira, and Jenkins, only to find their GitHub wide open. Join us as we dissect the challenges of transitioning from the development environments of the past to the cloud-centric landscapes of today.