GitGuardian
@GitGuardian
The end-to-end NHI security platform for enterprises. Powerful Secrets detection, remediation and NHI Governance . 🏆 #1 App on GitHub.
You might like
🚨 NEW: Our State of Secrets Sprawl 2025 Report has dropped! We analyzed GitHub, Docker Hub, and even AI-assisted coding—the results will surprise you. Get the full report: gitguardian.com/state-of-secre… #AppSec #CyberSecurity #SecretsManagement
Security teams need to stop being the department of "no" and start being the department of "how." Hear more from @GitGuardian Developer Advocate Dwayne McDaniel in this RSAC Podcast. spr.ly/60157m4mH
Very cool analysis by @GitGuardian, adding extra insights into the run-up to the attack: blog.gitguardian.com/shai-hulud-2/
As cyber threats grow more sophisticated, organizations need innovative defenses to stay protected. That’s why we’re proud to see 3 of our portfolio companies recognized on @Fortune’s Cyber 60 list in the growth stage category. Congratulations to @GitGuardian, @HuntressLabs, &…
Think your Artifactory token is safe in that Jenkinsfile? So did the last company... until their CI/CD pipeline became an attack vector. Read-only tokens can still write your downfall. devopsdigest.com/the-hidden-dan… #DevOps #Security
🔓 Artifactory tokens: the skeleton keys to your kingdom. Leaked one? Congrats, you just invited attackers to your production party. Read-only? More like read-everything. devopsdigest.com/the-hidden-dan… #SupplyChainSecurity #DevSecOps
🚢 15M Docker images scanned. 🔐 100K valid secrets found. 😱 7K+ active AWS keys exposed. 🏭 Fortune 500 companies affected. 🧪 Secrets in ENV, configs, layers. 🛡️ Time to scan your containers. Read more : s.gitguardian.com/eede3e
Secrets #scanning isn't just about monitoring code repositories like GitHub. The 2025 GitGuardian report reveals a surge in hardcoded #secrets, with 23.7M added in 2024. Critical exposures also occur in collaboration tools like Slack and Jira☝️🤖 buff.ly/2lxxh6e
Security isn’t just about tech—it’s about people. Kayssar Daher shares why building relationships in a company is just as critical as patching vulnerabilities. 🔑 🎧 Listen to the latest Security Repo Podcast! : youtu.be/qUEameZsDr4 #SecurityLeadership #DevSecOps #AppSec
🎙️ Time to properly meet your Security Repo Podcast co-host! The latest episode we get to know Kayssar Daher—his journey, security hot takes, and why he thinks security is just “housekeeping.” Listen now: youtu.be/qUEameZsDr4 #CyberSecurity #AppSec #DevSecOps
🔑 Git is powerful… and permanent. Many assume overwriting a commit removes secrets, but Git’s history is forever! At #WWHF #MileHigh2025, we discussed why rotation—not deletion—is the only safe fix for exposed credentials. Read more: c.gitguardian.com/wwhfmh
"Security teams can't be everywhere—but your devs can." 🎯 Security Champions help spread security knowledge! Learn how to start (and scale) a great program on the latest Security Repo Podcast! 🎙️ Listen here: youtu.be/WWzJe7-kJ5g #SecurityChampions #AppSec #DevSecOps
🚨 Leaked AWS keys aren’t fully revoked! At #WWHF #MileHigh2025, we learned that AWS’s CompromisedKeyQuarantine policy doesn’t prevent all actions—it’s not really a security feature. Rotate exposed secrets immediately! More insights: c.gitguardian.com/wwhfmh
👑 Security Champion Programs help build trust, catch risks early, and make security a shared responsibility. 🚀 Dustin Lehr shares what works (and what doesn’t) in the latest Security Repo Podcast! 🎙️ Listen now: youtu.be/WWzJe7-kJ5g #CyberSecurity #AppSec #DevSecOps
IAM without non-human identity (NHI) governance? Incomplete. ❌ Service accounts, APIs, & machine identities are prime targets for attackers. It’s time for CISOs to take charge & secure NHIs. 🔐 Full breakdown: c.gitguardian.com/ciso-iam
🚨 Non-human identities (NHIs) outnumber human users by 45:1—yet many IAM strategies ignore them. CISOs must take ownership of NHI security to prevent breaches. Don’t leave the biggest attack surface unprotected! 🔑 More insights here: c.gitguardian.com/ciso-iam
From ancient texts to ransomware notes—Cherie Burgett bridges philosophy & cybersecurity at Mining & Metals ISAC. Learn how interpreting threat actor behavior can improve defenses. 🛡️ #ThreatIntel #Hermeneutics youtu.be/VkHXvNn4FBM
🎭 Hermeneutics meets cybersecurity! Mining & Metals ISAC’s Cherie Burgett applies ancient interpretation techniques to modern threat intelligence. 🔍 #CyberThreats youtu.be/VkHXvNn4FBM
🤔 Comparing Secrets Detection solutions? Don't get lost in the 📊 metrics maze! 🎯The F1 score balances precision and recall to find the sweet spot. 👉 Learn how to use it s.gitguardian.com/f1score
Observability isn't just metrics, logs, and traces—it's about context! Josh Lee breaks down why understanding the why behind your data is crucial for both #DevOps and #security. 💡 Catch his insights on the most recent Security Repo Podcast episode: c.gitguardian.com/8az
United States Trends
- 1. Florida 104K posts
- 2. Texas 178K posts
- 3. Ohio State 28.9K posts
- 4. Ohio State 28.9K posts
- 5. #SmallBusinessSaturday 2,499 posts
- 6. Kentucky 15.1K posts
- 7. Kentucky 15.1K posts
- 8. Buckeyes 5,475 posts
- 9. Go Blue 7,030 posts
- 10. Leeds 27.4K posts
- 11. Go Bucks 2,412 posts
- 12. The Game 1.04M posts
- 13. Saban 6,003 posts
- 14. Sunderland 22.4K posts
- 15. Foden 11.6K posts
- 16. Grade 3 3,013 posts
- 17. Good Saturday 36.7K posts
- 18. Tyler Adams 3,279 posts
- 19. #SaturdayVibes 4,199 posts
- 20. Gameday 31K posts
You might like
-
公務員面接の達人
@Riko_mentor -
HackerSploit
@HackerSploit -
OccupytheWeb
@three_cube -
ProjectDiscovery
@pdiscoveryio -
ςεяβεяμs - мαℓωαяε яεsεαяςнεя
@c3rb3ru5d3d53c -
Luca
@lucawashenko -
Pentester Academy
@SecurityTube -
Daniel Kelley
@danielmakelley -
Suraj
@PwnFunction -
TCM Security
@TCMSecurity -
GitHub Security
@GitHubSecurity -
iDenfy
@iDenfy -
Florian Roth ⚡️
@cyb3rops -
Luke Stephens (hakluke)
@hakluke -
ippsec
@ippsec
Something went wrong.
Something went wrong.