The weaponization of digital trust involves exploiting an application or tool we use in our daily digital life to perform our business or personal tasks for malicious purposes. It is a technique increasingly used by the threat actors to carry out malicious actions such as the delivery of malware or links to phishing pages.
Build a developer portal from scratch with Backstage, an open platform. In this tutorial, learn how to create a secure-by-default software catalog for bootstrapping GitHub projects.
Open source code is a vital aspect of modern development. It allows developers to increase their application’s functionality, while reducing overall development time. However, the system isn’t perfect. The nature of third party software and it’s dependencies often creates opportunity for security vulnerabilities to lurk in libraries and downloads.
GitGuardian has made strategic executive hires and been selected for the French Tech 2030 program, positioning the company for growth and advancement in cybersecurity and code security solutions.
Learn how your secrets management can affect your DevOps performance, measured by DORA metrics, as well as increase your risk as an organization.
GitHub's Push Protection is now free for all public repositories, a significant milestone for open-source security! Find out the key points you need to keep in mind before using it to safeguard your code repositories.
Discover how honeytokens, digital decoys designed to detect unauthorized access, can strengthen the security of your CI/CD pipelines. In this guide, we offer step-by-step instructions for integrating them into popular pipelines like Jenkins, GitLab, and AWS CodePipeline.
For the 23rd year, Techno Security & Digital Forensics Conference East brought practitioners from law enforcement, academia, and security industry pros to learn from each over.