GitGuardian (@gitguardian) 's Twitter Profile
GitGuardian

@gitguardian

The end-to-end NHI security platform for enterprises.
Powerful Secrets detection, remediation and NHI Governance . 🏆 #1 App on GitHub.

ID: 853962281360781312

linkhttps://Link.Gallery/gitguardian calendar_today17-04-2017 13:24:08

6,6K Tweet

6,6K Followers

578 Following

GitGuardian (@gitguardian) 's Twitter Profile Photo

AI with no guardrails 🚗💨, FOIA for transparency, and OPSEC tips—Stephanie Honore breaks it all down on the #SecurityRepoPodcast. Bonus: her take on 'spycore' music! 🎧 c.gitguardian.com/srp-foia

AI with no guardrails 🚗💨, FOIA for transparency, and OPSEC tips—Stephanie Honore breaks it all down on the #SecurityRepoPodcast. 

Bonus: her take on 'spycore' music! 🎧 
c.gitguardian.com/srp-foia
GitGuardian (@gitguardian) 's Twitter Profile Photo

Cedar Point isn’t the only thrill in Sandusky, OH! 🚀 CodeMash 2024 was all about sharing community wisdom, which is really exciting stuff. Who’s responsible for non-human identity security? Learn what the community thought. Catch up here: c.gitguardian.com/cdmsh

Cedar Point isn’t the only thrill in Sandusky, OH! 🚀 CodeMash 2024 was all about sharing community wisdom, which is really exciting stuff. 
Who’s responsible for non-human identity security? Learn what the community thought.

Catch up here: c.gitguardian.com/cdmsh
GitGuardian (@gitguardian) 's Twitter Profile Photo

What do observability & security have in common? Context is king 👑. On this episode of the Security Repo Podcast, Josh Lee explains why collecting all the data isn’t enough—it’s about what you focus on. Learn more: c.gitguardian.com/8az #DevSecOps #Observability

What do observability & security have in common? Context is king 👑. 
On this episode of the Security Repo Podcast, Josh Lee explains why collecting all the data isn’t enough—it’s about what you focus on. Learn more: c.gitguardian.com/8az
 #DevSecOps 
#Observability
GitGuardian (@gitguardian) 's Twitter Profile Photo

Observability isn't just metrics, logs, and traces—it's about context! Josh Lee breaks down why understanding the why behind your data is crucial for both #DevOps and #security. 💡 Catch his insights on the most recent Security Repo Podcast episode: c.gitguardian.com/8az

Observability isn't just metrics, logs, and traces—it's about context! Josh Lee breaks down why understanding the why behind your data is crucial for both #DevOps and #security. 

💡 Catch his insights on the most recent Security Repo Podcast episode: c.gitguardian.com/8az
GitGuardian (@gitguardian) 's Twitter Profile Photo

🤔 Comparing Secrets Detection solutions? Don't get lost in the 📊 metrics maze! 🎯The F1 score balances precision and recall to find the sweet spot. 👉 Learn how to use it s.gitguardian.com/f1score

🤔 Comparing Secrets Detection solutions? Don't get lost in the 📊 metrics maze!
🎯The F1 score balances precision and recall to find the sweet spot.
👉 Learn how to use it s.gitguardian.com/f1score
GitGuardian (@gitguardian) 's Twitter Profile Photo

🎭 Hermeneutics meets cybersecurity! Mining & Metals ISAC’s Cherie Burgett applies ancient interpretation techniques to modern threat intelligence. 🔍 #CyberThreats youtu.be/VkHXvNn4FBM

🎭 Hermeneutics meets cybersecurity! 

Mining & Metals ISAC’s Cherie Burgett applies ancient interpretation techniques to modern threat intelligence. 

🔍 #CyberThreats youtu.be/VkHXvNn4FBM
GitGuardian (@gitguardian) 's Twitter Profile Photo

From ancient texts to ransomware notes—Cherie Burgett bridges philosophy & cybersecurity at Mining & Metals ISAC. Learn how interpreting threat actor behavior can improve defenses. 🛡️ #ThreatIntel #Hermeneutics youtu.be/VkHXvNn4FBM

From ancient texts to ransomware notes—Cherie Burgett bridges philosophy & cybersecurity at Mining & Metals ISAC. Learn how interpreting threat actor behavior can improve defenses. 
🛡️ #ThreatIntel #Hermeneutics 

youtu.be/VkHXvNn4FBM
GitGuardian (@gitguardian) 's Twitter Profile Photo

🚨 Non-human identities (NHIs) outnumber human users by 45:1—yet many IAM strategies ignore them. CISOs must take ownership of NHI security to prevent breaches. Don’t leave the biggest attack surface unprotected! 🔑 More insights here: c.gitguardian.com/ciso-iam

🚨 Non-human identities (NHIs) outnumber human users by 45:1—yet many IAM strategies ignore them.

CISOs must take ownership of NHI security to prevent breaches. Don’t leave the biggest attack surface unprotected! 🔑

More insights here: c.gitguardian.com/ciso-iam
GitGuardian (@gitguardian) 's Twitter Profile Photo

IAM without non-human identity (NHI) governance? Incomplete. ❌ Service accounts, APIs, & machine identities are prime targets for attackers. It’s time for CISOs to take charge & secure NHIs. 🔐 Full breakdown: c.gitguardian.com/ciso-iam

IAM without non-human identity (NHI) governance? Incomplete. ❌

Service accounts, APIs, & machine identities are prime targets for attackers. It’s time for CISOs to take charge & secure NHIs. 🔐

Full breakdown: 
c.gitguardian.com/ciso-iam
GitGuardian (@gitguardian) 's Twitter Profile Photo

👑 Security Champion Programs help build trust, catch risks early, and make security a shared responsibility. 🚀 Dustin Lehr shares what works (and what doesn’t) in the latest Security Repo Podcast! 🎙️ Listen now: youtu.be/WWzJe7-kJ5g #CyberSecurity #AppSec #DevSecOps

👑 
Security Champion Programs help build trust, catch risks early, and make security a shared responsibility. 🚀
Dustin Lehr shares what works (and what doesn’t) in the latest Security Repo Podcast! 🎙️

Listen now: youtu.be/WWzJe7-kJ5g

#CyberSecurity #AppSec #DevSecOps
GitGuardian (@gitguardian) 's Twitter Profile Photo

🚨 Leaked AWS keys aren’t fully revoked! At #WWHF #MileHigh2025, we learned that AWS’s CompromisedKeyQuarantine policy doesn’t prevent all actions—it’s not really a security feature. Rotate exposed secrets immediately! More insights: c.gitguardian.com/wwhfmh

🚨 Leaked AWS keys aren’t fully revoked! At #WWHF #MileHigh2025, we learned that AWS’s CompromisedKeyQuarantine policy doesn’t prevent all actions—it’s not really a security feature.

Rotate exposed secrets immediately! 
More insights:
c.gitguardian.com/wwhfmh
GitGuardian (@gitguardian) 's Twitter Profile Photo

"Security teams can't be everywhere—but your devs can." 🎯 Security Champions help spread security knowledge! Learn how to start (and scale) a great program on the latest Security Repo Podcast! 🎙️ Listen here: youtu.be/WWzJe7-kJ5g #SecurityChampions #AppSec #DevSecOps

"Security teams can't be everywhere—but your devs can." 🎯
Security Champions help spread security knowledge!

Learn how to start (and scale) a great program on the latest Security Repo Podcast! 🎙️

Listen here: youtu.be/WWzJe7-kJ5g

#SecurityChampions #AppSec #DevSecOps
GitGuardian (@gitguardian) 's Twitter Profile Photo

🔑 Git is powerful… and permanent. Many assume overwriting a commit removes secrets, but Git’s history is forever! At #WWHF #MileHigh2025, we discussed why rotation—not deletion—is the only safe fix for exposed credentials. Read more: c.gitguardian.com/wwhfmh

🔑 Git is powerful… and permanent. Many assume overwriting a commit removes secrets, but Git’s history is forever!
At #WWHF #MileHigh2025, we discussed why rotation—not deletion—is the only safe fix for exposed credentials. 
Read more: c.gitguardian.com/wwhfmh
GitGuardian (@gitguardian) 's Twitter Profile Photo

🎙️ Time to properly meet your Security Repo Podcast co-host! The latest episode we get to know Kayssar Daher—his journey, security hot takes, and why he thinks security is just “housekeeping.” Listen now: youtu.be/qUEameZsDr4 #CyberSecurity #AppSec #DevSecOps

🎙️ Time to properly meet your Security Repo Podcast co-host!

The latest episode we get to know Kayssar Daher—his journey, security hot takes, and why he thinks security is just “housekeeping.”
Listen now: 
youtu.be/qUEameZsDr4

#CyberSecurity #AppSec #DevSecOps
GitGuardian (@gitguardian) 's Twitter Profile Photo

Security isn’t just about tech—it’s about people. Kayssar Daher shares why building relationships in a company is just as critical as patching vulnerabilities. 🔑 🎧 Listen to the latest Security Repo Podcast! : youtu.be/qUEameZsDr4 #SecurityLeadership #DevSecOps #AppSec

Security isn’t just about tech—it’s about people.

Kayssar Daher shares why building relationships in a company is just as critical as patching vulnerabilities. 🔑

🎧 Listen to the latest Security Repo Podcast! : youtu.be/qUEameZsDr4

#SecurityLeadership #DevSecOps #AppSec
Manuel Bissey (@manuelbissey) 's Twitter Profile Photo

Secrets #scanning isn't just about monitoring code repositories like GitHub. The 2025 GitGuardian report reveals a surge in hardcoded #secrets, with 23.7M added in 2024. Critical exposures also occur in collaboration tools like Slack and Jira☝️🤖 buff.ly/2lxxh6e

Secrets #scanning isn't just about monitoring code repositories like GitHub. The 2025 GitGuardian report reveals a surge in hardcoded #secrets, with 23.7M added in 2024. Critical exposures also occur in collaboration tools like Slack and Jira☝️🤖

buff.ly/2lxxh6e
GitGuardian (@gitguardian) 's Twitter Profile Photo

🚢 15M Docker images scanned. 🔐 100K valid secrets found. 😱 7K+ active AWS keys exposed. 🏭 Fortune 500 companies affected. 🧪 Secrets in ENV, configs, layers. 🛡️ Time to scan your containers. Read more : s.gitguardian.com/eede3e

GitGuardian (@gitguardian) 's Twitter Profile Photo

🔓 Artifactory tokens: the skeleton keys to your kingdom. Leaked one? Congrats, you just invited attackers to your production party. Read-only? More like read-everything. devopsdigest.com/the-hidden-dan… #SupplyChainSecurity #DevSecOps

GitGuardian (@gitguardian) 's Twitter Profile Photo

Think your Artifactory token is safe in that Jenkinsfile? So did the last company... until their CI/CD pipeline became an attack vector. Read-only tokens can still write your downfall. devopsdigest.com/the-hidden-dan… #DevOps #Security