Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The case against secrets in .env files

Most developers rely on.env files to store secrets like API keys, database passwords, and tokens. But what if I told you this common practice can leave you wide open to attacks? In this video, I break down why storing secrets in a.env file is dangerous, how attackers can exploit it, and what safer alternatives you should be using instead.

Detect Secrets in GitLab CI Logs using ggshield and Bring Your Own Source

Discover how to automatically detect secrets in GitLab CI logs using ggshield and GitGuardian's Bring Your Own Source initiative. Learn to set up real-time scanning to prevent credential leaks, enhance compliance, and secure your entire CI/CD pipeline from hidden risks.

When Google Says "Scan for Secrets": A Complete Guide to Finding Hidden Credentials in Salesforce

The Salesloft Drift breach affected hundreds of organizations through Salesforce, including Cloudflare, Palo Alto Networks, and Zscaler. Google now explicitly recommends running secrets scanning tools across Salesforce data—here's your complete guide.

Secrets Sprawl and Credential Abuse: 2025's Hidden Enterprise Threat

In 2025, cybersecurity is no longer defined by firewalls or VPN barriers—it hinges on identity. Enterprises face a growing hazard from secrets sprawl and credential abuse. With API keys, tokens, and passwords scattered across repos, containers, and dev chat channels, attackers exploit these gaps with alarming precision. This isn’t just an IT headache—it’s a boardroom crisis that demands strategic action.

Bridging runtime visibility and secrets management in Kubernetes with Sweet Security and CyberArk

Secrets management is a foundational pillar of cloud security. It enables secure storage, rotation, and access control for application secrets. But in Kubernetes environments, secrets don’t just live in vaults; they move, execute, and often proliferate across clusters and containers. Without visibility into how secrets are used at runtime, organizations risk exposing sensitive data without realizing it.

The Alarming Surge in Leaked Credentials: Protecting Your Business in 2025

One of the most pressing cyber threats businesses face today is the rampant rise in leaked credentials. Data from Cyberint, a Check Point company, reveals a staggering 160% increase in leaked credentials so far in 2025 compared to 2024. This isn’t just a statistic; it’s a direct threat to your organization’s security.

Secrets Management: Definition, Challenges, and 7 Best Practices

A single leaked password can lead to devastating breaches. Thus, it’s important to understand that managing your organization’s secrets is not just an IT concern — it’s a business-critical security practice. From your customers’ data to the organization’s financial information, your secrets hold the keys to the most vital areas within your infrastructure. If they are not protected, neither is your sensitive data.

GitGuardian Launches MCP Server to Bring Secrets Security into Developer Workflows

GitGuardian, the leader in automated secrets detection and remediation, today announced the launch of its Model Context Protocol (MCP) Server, a powerful new infrastructure designed to bring AI-assisted secrets security directly into developer environments. As intelligent agents begin to reshape the software development landscape, GitGuardian's MCP server marks a pivotal shift in aligning security practices with an environment where code is shipped faster than ever.

From Chaos to Control: How ML-Driven Prioritization Solves Secrets Leaks

Security teams are still drowning in alerts. Solution? Leverage machine learning to prioritize your secrets risks! Discover how we use proprietary models that analyze the context in which your incidents occur, score their severity level, and generate clear explanations and guidelines that empower your team to focus on what matters most.