Back to blog

Security boulevard

Top 10 iac tools

Top 10 Infrastructure as Code (IaC) Tools to Know in 2024

Updated 03.2024 Is there a way to easily fix and debug issues that only happen in specific production systems? There is. The way to fix them

How to Build Your DevOps Cloud Security Stack

How to Build Your DevOps Cloud Security Stack

For a long time, the best approach to network and data security was network segregation. If you protect your intranet from the Internet, there are significantly

Spectral launches DeepConfig to ensure no misconfiguration for ALL layers of software

TEL AVIV, Israel, Aug. 5, 2021 /PRNewswire/ — Spectral, the developer-first cybersecurity company, today announced the release of DeepConfig, a detection technology that can identify misconfigurations at all layers

identity and access management best practices

Top 5 Identity and Access Management Best Practices for DevSecOps

Did you know that human error is by far the leading cause in data breaches? Up to 95% of all data breaches are caused by misconfiguration,

How to set up git branch protection rules

How to set up Git branch protection rules

There’s probably not a developer alive who is not familiar with Git. It is, after all, the most popular software versioning system out there. Git is

Spectral launches Spectral Logs to Ensure Sensitive Data Isn’t Accidentally Exposed

Spectral Logs enables additional layer to existing protection of code and data to shield against breaches and ensure PCI DSS and GDPR compliance TEL AVIV, Israel, July

3 Weeks into the GitHub CoPilot secrets leak – What have we learned

Artificial intelligence has long been heralded as the solution to all our problems: “Don’t worry about it – let the computers do the worrying for you”.

7 Tips to Securely Open Source Your Internal Software

Researchers forecast that, over the next few years, open-source code will reach an annual growth rate of more than 25 percent. With cost savings and increased

Where your code secrets hide: risky filetypes to know

Where your code secrets hide: risky filetypes to know

As you develop applications, are you doing everything you can do to protect your data, code, and intellectual property? If you’re not running a secret scanner

Stop leaks at the source!