GitGuardian's profile picture. The end-to-end NHI security platform for enterprises.
Powerful Secrets detection, remediation and NHI Governance . 🏆 #1 App on GitHub.

GitGuardian

@GitGuardian

The end-to-end NHI security platform for enterprises. Powerful Secrets detection, remediation and NHI Governance . 🏆 #1 App on GitHub.

置頂

🚨 NEW: Our State of Secrets Sprawl 2025 Report has dropped! We analyzed GitHub, Docker Hub, and even AI-assisted coding—the results will surprise you. Get the full report: gitguardian.com/state-of-secre… #AppSec #CyberSecurity #SecretsManagement

GitGuardian's tweet image. 🚨 NEW: Our State of Secrets Sprawl 2025 Report has dropped!
We analyzed GitHub, Docker Hub, and even AI-assisted coding—the results will surprise you.
Get the full report: gitguardian.com/state-of-secre…
#AppSec #CyberSecurity #SecretsManagement

Think your Artifactory token is safe in that Jenkinsfile? So did the last company... until their CI/CD pipeline became an attack vector. Read-only tokens can still write your downfall. devopsdigest.com/the-hidden-dan… #DevOps #Security


🔓 Artifactory tokens: the skeleton keys to your kingdom. Leaked one? Congrats, you just invited attackers to your production party. Read-only? More like read-everything. devopsdigest.com/the-hidden-dan… #SupplyChainSecurity #DevSecOps


🚢 15M Docker images scanned. 🔐 100K valid secrets found. 😱 7K+ active AWS keys exposed. 🏭 Fortune 500 companies affected. 🧪 Secrets in ENV, configs, layers. 🛡️ Time to scan your containers. Read more : s.gitguardian.com/eede3e


GitGuardian 已轉發

Secrets #scanning isn't just about monitoring code repositories like GitHub. The 2025 GitGuardian report reveals a surge in hardcoded #secrets, with 23.7M added in 2024. Critical exposures also occur in collaboration tools like Slack and Jira☝️🤖 buff.ly/2lxxh6e

manuelbissey's tweet image. Secrets #scanning isn't just about monitoring code repositories like GitHub. The 2025 GitGuardian report reveals a surge in hardcoded #secrets, with 23.7M added in 2024. Critical exposures also occur in collaboration tools like Slack and Jira☝️🤖

buff.ly/2lxxh6e

Security isn’t just about tech—it’s about people. Kayssar Daher shares why building relationships in a company is just as critical as patching vulnerabilities. 🔑 🎧 Listen to the latest Security Repo Podcast! : youtu.be/qUEameZsDr4 #SecurityLeadership #DevSecOps #AppSec

GitGuardian's tweet image. Security isn’t just about tech—it’s about people.

Kayssar Daher shares why building relationships in a company is just as critical as patching vulnerabilities. 🔑

🎧 Listen to the latest Security Repo Podcast! : youtu.be/qUEameZsDr4

#SecurityLeadership #DevSecOps #AppSec

🎙️ Time to properly meet your Security Repo Podcast co-host! The latest episode we get to know Kayssar Daher—his journey, security hot takes, and why he thinks security is just “housekeeping.” Listen now: youtu.be/qUEameZsDr4 #CyberSecurity #AppSec #DevSecOps

GitGuardian's tweet image. 🎙️ Time to properly meet your Security Repo Podcast co-host!

The latest episode we get to know Kayssar Daher—his journey, security hot takes, and why he thinks security is just “housekeeping.”
Listen now: 
youtu.be/qUEameZsDr4

#CyberSecurity #AppSec #DevSecOps

🔑 Git is powerful… and permanent. Many assume overwriting a commit removes secrets, but Git’s history is forever! At #WWHF #MileHigh2025, we discussed why rotation—not deletion—is the only safe fix for exposed credentials. Read more: c.gitguardian.com/wwhfmh

GitGuardian's tweet image. 🔑 Git is powerful… and permanent. Many assume overwriting a commit removes secrets, but Git’s history is forever!
At #WWHF #MileHigh2025, we discussed why rotation—not deletion—is the only safe fix for exposed credentials. 
Read more: c.gitguardian.com/wwhfmh

"Security teams can't be everywhere—but your devs can." 🎯 Security Champions help spread security knowledge! Learn how to start (and scale) a great program on the latest Security Repo Podcast! 🎙️ Listen here: youtu.be/WWzJe7-kJ5g #SecurityChampions #AppSec #DevSecOps

GitGuardian's tweet image. "Security teams can't be everywhere—but your devs can." 🎯
Security Champions help spread security knowledge!

Learn how to start (and scale) a great program on the latest Security Repo Podcast! 🎙️

Listen here: youtu.be/WWzJe7-kJ5g

#SecurityChampions #AppSec #DevSecOps

🚨 Leaked AWS keys aren’t fully revoked! At #WWHF #MileHigh2025, we learned that AWS’s CompromisedKeyQuarantine policy doesn’t prevent all actions—it’s not really a security feature. Rotate exposed secrets immediately! More insights: c.gitguardian.com/wwhfmh

GitGuardian's tweet image. 🚨 Leaked AWS keys aren’t fully revoked! At #WWHF #MileHigh2025, we learned that AWS’s CompromisedKeyQuarantine policy doesn’t prevent all actions—it’s not really a security feature.

Rotate exposed secrets immediately! 
More insights:
c.gitguardian.com/wwhfmh

👑 Security Champion Programs help build trust, catch risks early, and make security a shared responsibility. 🚀 Dustin Lehr shares what works (and what doesn’t) in the latest Security Repo Podcast! 🎙️ Listen now: youtu.be/WWzJe7-kJ5g #CyberSecurity #AppSec #DevSecOps

GitGuardian's tweet image. 👑 
Security Champion Programs help build trust, catch risks early, and make security a shared responsibility. 🚀
Dustin Lehr shares what works (and what doesn’t) in the latest Security Repo Podcast! 🎙️

Listen now: youtu.be/WWzJe7-kJ5g

#CyberSecurity #AppSec #DevSecOps

IAM without non-human identity (NHI) governance? Incomplete. ❌ Service accounts, APIs, & machine identities are prime targets for attackers. It’s time for CISOs to take charge & secure NHIs. 🔐 Full breakdown: c.gitguardian.com/ciso-iam

GitGuardian's tweet image. IAM without non-human identity (NHI) governance? Incomplete. ❌

Service accounts, APIs, & machine identities are prime targets for attackers. It’s time for CISOs to take charge & secure NHIs. 🔐

Full breakdown: 
c.gitguardian.com/ciso-iam

🚨 Non-human identities (NHIs) outnumber human users by 45:1—yet many IAM strategies ignore them. CISOs must take ownership of NHI security to prevent breaches. Don’t leave the biggest attack surface unprotected! 🔑 More insights here: c.gitguardian.com/ciso-iam

GitGuardian's tweet image. 🚨 Non-human identities (NHIs) outnumber human users by 45:1—yet many IAM strategies ignore them.

CISOs must take ownership of NHI security to prevent breaches. Don’t leave the biggest attack surface unprotected! 🔑

More insights here: c.gitguardian.com/ciso-iam

From ancient texts to ransomware notes—Cherie Burgett bridges philosophy & cybersecurity at Mining & Metals ISAC. Learn how interpreting threat actor behavior can improve defenses. 🛡️ #ThreatIntel #Hermeneutics youtu.be/VkHXvNn4FBM

GitGuardian's tweet image. From ancient texts to ransomware notes—Cherie Burgett bridges philosophy & cybersecurity at Mining & Metals ISAC. Learn how interpreting threat actor behavior can improve defenses. 
🛡️ #ThreatIntel #Hermeneutics 

youtu.be/VkHXvNn4FBM

🎭 Hermeneutics meets cybersecurity! Mining & Metals ISAC’s Cherie Burgett applies ancient interpretation techniques to modern threat intelligence. 🔍 #CyberThreats youtu.be/VkHXvNn4FBM

GitGuardian's tweet image. 🎭 Hermeneutics meets cybersecurity! 

Mining & Metals ISAC’s Cherie Burgett applies ancient interpretation techniques to modern threat intelligence. 

🔍 #CyberThreats youtu.be/VkHXvNn4FBM

🤔 Comparing Secrets Detection solutions? Don't get lost in the 📊 metrics maze! 🎯The F1 score balances precision and recall to find the sweet spot. 👉 Learn how to use it s.gitguardian.com/f1score

GitGuardian's tweet image. 🤔 Comparing Secrets Detection solutions? Don't get lost in the 📊 metrics maze!
🎯The F1 score balances precision and recall to find the sweet spot.
👉 Learn how to use it s.gitguardian.com/f1score

Observability isn't just metrics, logs, and traces—it's about context! Josh Lee breaks down why understanding the why behind your data is crucial for both #DevOps and #security. 💡 Catch his insights on the most recent Security Repo Podcast episode: c.gitguardian.com/8az

GitGuardian's tweet image. Observability isn't just metrics, logs, and traces—it's about context! Josh Lee breaks down why understanding the why behind your data is crucial for both #DevOps and #security. 

💡 Catch his insights on the most recent Security Repo Podcast episode: c.gitguardian.com/8az

What do observability & security have in common? Context is king 👑. On this episode of the Security Repo Podcast, Josh Lee explains why collecting all the data isn’t enough—it’s about what you focus on. Learn more: c.gitguardian.com/8az #DevSecOps #Observability

GitGuardian's tweet image. What do observability & security have in common? Context is king 👑. 
On this episode of the Security Repo Podcast, Josh Lee explains why collecting all the data isn’t enough—it’s about what you focus on. Learn more: c.gitguardian.com/8az
 #DevSecOps 
#Observability

Cedar Point isn’t the only thrill in Sandusky, OH! 🚀 CodeMash 2024 was all about sharing community wisdom, which is really exciting stuff. Who’s responsible for non-human identity security? Learn what the community thought. Catch up here: c.gitguardian.com/cdmsh

GitGuardian's tweet image. Cedar Point isn’t the only thrill in Sandusky, OH! 🚀 CodeMash 2024 was all about sharing community wisdom, which is really exciting stuff. 
Who’s responsible for non-human identity security? Learn what the community thought.

Catch up here: c.gitguardian.com/cdmsh

AI with no guardrails 🚗💨, FOIA for transparency, and OPSEC tips—Stephanie Honore breaks it all down on the #SecurityRepoPodcast. Bonus: her take on 'spycore' music! 🎧 c.gitguardian.com/srp-foia

GitGuardian's tweet image. AI with no guardrails 🚗💨, FOIA for transparency, and OPSEC tips—Stephanie Honore breaks it all down on the #SecurityRepoPodcast. 

Bonus: her take on 'spycore' music! 🎧 
c.gitguardian.com/srp-foia

Loading...

Something went wrong.


Something went wrong.