Tutorials
How to Handle Secrets in Helm
Learn step-by-step techniques and best practices to handle secrets in Helm charts safely and effectively. Level up your Helm deployments today! ...
Getting Started With SPIFFE For Multi-Cloud Secure Workload Authentication
SPIFFE stands for Secure Production Identity Framework for Everyone, and aims to replace single-factor access credentials with a highly scalable identity solution. This blog post provides some practical applications of SPIFFE in ...
Securing Containers with Seccomp
In this article we present a novel way to protect your container applications post-exploitation. This additional protection is called Seccomp-BPF ...
Managing AWS IAM with Terraform
Get started with IAM by using Terraform to create users, groups, and policies ...
Streamlining CLI Authentication: Implementing OAuth Login in Python
When building an application that requires user authentication, implementing a secure login flow is critical. In this article, we'll walk through how we created a robust OAuth login flow for ggshield, our ...
Activating end-to-end secrets security with CyberArk and GitGuardian
In this guide, we'll walk you through integrating CyberArk Conjur with GitGuardian, step by step ...
Pulumi VS Terraform: The Definitive Guide to Choosing Your IaC Tool
In this blog, we do a deep dive into Pulumi V.S. Terraform (and slightly touch the mechanism of AWS CDK/CDK for Terraform, for that matter) ...
Ethical Hacking Q&A with Sonya Moisset
Join Mackenzie Jackson and Sonya Moisset for an eye-opening discussion about Ethical Hacking as Sonya answers questions from Mack and the webinar audience ...
“Do Not Push To Production” And Other Insecure Code, Demonstrated By An Ethical Hacker
Enjoy highlights from GitGuardian's ethical hacking webinar with a friend from Snyk ...
Webinar Recap: Hands-on guide to Runtime Security for CI/CD Pipelines with StepSecurity
A condensed recap of our hands-on runtime security webinar from September. Get the juiciest knowledge nuggets and pointers to more ...