How to Secure Your IaC and Configuration Management Tools with GitGuardian’s Honeytoken

How to Secure Your IaC and Configuration Management Tools with GitGuardian’s Honeytoken

It is important to secure environments with intelligent solutions. GitGuardian Honeytoken can help protect your IaC and Config Management tools ... Read More
Platform Engineering: Building Your Developer Portal with Backstage (Pt 2)

Platform Engineering: Building Your Developer Portal with Backstage (Pt 2)

| | Tutorials
Enhance your portal's capabilities with backend plugins and unlock custom functionalities in the second part of our Backstage tour. Step-by-step instructions provided! ... Read More
How to Secure Your Container Registries With GitGuardian's Honeytoken

How to Secure Your Container Registries With GitGuardian’s Honeytoken

| | honeytokens
Discover how to enhance the security of your container registries using honeytokens. Learn the steps to secure Docker Registry, GitHub Container Registry, and GitLab Container Registry with honeytokens. Strengthen your DevOps pipeline and protect your valuable assets ... Read More
Platform Engineering: Building Your Developer Portal with Backstage (Pt 1)

Platform Engineering: Building Your Developer Portal with Backstage (Pt 1)

| | Tutorials
Build a developer portal from scratch with Backstage, an open platform. In this tutorial, learn how to create a secure-by-default software catalog for bootstrapping GitHub projects ... Read More
How to Secure Your CI/CD Pipelines with GitGuardian Honeytokens

How to Secure Your CI/CD Pipelines with GitGuardian Honeytokens

| | honeytokens
Discover how honeytokens, digital decoys designed to detect unauthorized access, can strengthen the security of your CI/CD pipelines. In this guide, we offer step-by-step instructions for integrating them into popular pipelines like Jenkins, GitLab, and AWS CodePipeline ... Read More
What are Honeytokens or Canary tokens? Quick Explainer

How to Secure Your SCM Repositories with GitGuardian Honeytokens

| | honeytokens
Protect your code and secure your repositories with honeytokens. Learn how to create and add these digital traps to your SCM repositories and how GitGuardian helps you stay alert to potential threats. Read on for best practices and tips to make the most out of honeytokens ... Read More
Platform Engineering and Security: A Very Short Introduction

Platform Engineering and Security: A Very Short Introduction

| | DevSecOps
Is DevOps really dead? Learn about the rise of platform engineering and how it differs from DevOps in terms of self-service capabilities and automation. Discover how security fits into this new paradigm and the benefits of platform engineering for software development teams of various sizes ... Read More
Complete guide to GitHooks - Creating your own pre-commit hooks

How to Handle Secrets in Terraform

| | Best Practices
DevOps engineers must handle secrets with care. In this series, we summarize best practices for leveraging secrets with your everyday tools ... Read More
How to Handle Secrets in Kubernetes

How to Handle Secrets in Kubernetes

| | Best Practices
This blog post covers creating, storing, and using secrets in Kubernetes, encryption, RBAC, and auditing. It introduces Kubernetes External Secrets and best practices to enhance security. Let's dive in! ... Read More
Supply Chain Security: Secrets and Modern Security Frameworks (Part III)

Supply Chain Security: Secrets and Modern Security Frameworks (Part III)

In this final part, we'll discuss more software supply chain security frameworks and the critical role of secrets detection in them. We'll explore the NIST SSDF, SLSA, and OSC&R frameworks and how they cover the topic of secrets in software supply chain security ... Read More