Back to blog

Open Source Security

3 Weeks into the GitHub CoPilot secrets leak – What have we learned

Artificial intelligence has long been heralded as the solution to all our problems: “Don’t worry about it – let the computers do the worrying for you”.

How to fix secrets drift with Teller

Teller is an open-source secrets management tool for developers built in Go. It helps you manage, protect, and fix problems in your code and security posture

7 Tips to Securely Open Source Your Internal Software

Researchers forecast that, over the next few years, open-source code will reach an annual growth rate of more than 25 percent. With cost savings and increased

10 Free Developer Tools to Shift Left Security

10 Free Developer Tools to Shift Left Security

Have you ever produced a bug-free, well-tested release candidate that later failed the security tests done by InfoSec? This may be due to your security testing

the last mile of sensitive data

The Last Mile of Sensitive Data

Almost any given modern software project these days will contain a set of technologies that offer a developer-productivity story, for traditional cloud stacks and cloud native

The Beginner's Guide to Preventing Data Breaches in Your Code

The Beginner’s Guide to Preventing Data Breaches in Your Code

Quick announcement: with SpectralOps you can prevent data breaches by protecting your code from hard coded secrets and misconfigurations. You know how it goes: Every website,

Top 9 Git Secret Scanning Tools for DevSecOps

Top 9 Git Secret Scanning Tools for DevSecOps

Part of the Spectral API Security Series Collaboration is key. Not only in software development. But when it comes to collaboration on Git repositories, the word

SAML vs OAuth: The SSO Showdown

SAML vs OAuth: The SSO Showdown

SSO (Single Sign-On) is so ubiquitous today that it is hard to imagine a world without it. In the olden days before SSO, users had only

8 proven strategies to protect your code from data leaks

8 Proven Strategies To Protect Your Code From Data Leaks

Dealing with data leaks after they happen can be a pain. Not only are you tasked with trying to figure out where things went wrong, but

Stop leaks at the source!