Back to blog

DevSecOps

bad coding habits

5 Bad Coding Habits That Leave Your Source Code Exposed

In 2020 the average cost of a data breach was $3.86 Million. There are many ways that you can be proactive about your security to prevent

How to Choose a Secret Scanning Solution to Protect Credentials in Your Code

How safe are your passwords? How secure are your API keys? Are you sure your CI pipeline is configured using the best security practices? One of

Stopping Supply Chain Attacks With Preflight

It’s been a few weeks since the CodeCov hack sent ripples across the software development industry. One of these ripples was an increased awareness of supply

Credentials, Risk, and The Supply Chain: Lessons to Learn From The Codecov Breach

It seems like there’s a data breach disclosed every day. They come in a variety of forms and from all possible industries and verticals. However, some

Netz: Scan the internet while drinking coffee

Netz lets you run internet-wide misconfigurations research easily and continuously. It supports infrastructure-as-code so you can put your plan in a config file, run the CLI,

Stop leaks at the source!