CINXE.COM

Security - GitHub Resources

<!DOCTYPE html><html dir="ltr" lang="en-US"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width"/><meta http-equiv="Content-Security-Policy" content="default-src &#x27;none&#x27;; script-src &#x27;self&#x27; analytics.githubassets.com ghcc.githubassets.com js.monitor.azure.com/scripts/c/ms.analytics-web-4.min.js www.youtube.com; style-src &#x27;self&#x27; &#x27;unsafe-inline&#x27;; connect-src &#x27;self&#x27; browser.events.data.microsoft.com collector.githubapp.com edge.fullstory.com rs.fullstory.com; font-src &#x27;self&#x27; data:; img-src &#x27;self&#x27; data: github.githubassets.com images.ctfassets.net rs.fullstory.com ad.doubleclick.net pixel.quantserve.com sp.analytics.yahoo.com www.facebook.com px.ads.linkedin.com alb.reddit.com px4.ads.linkedin.com adservice.google.com; manifest-src &#x27;self&#x27;; frame-src &#x27;self&#x27; www.youtube.com player.vimeo.com play.vidyard.com octocaptcha.com; media-src &#x27;self&#x27;;"/><link rel="canonical" href="https://resources.github.com/topics/security/"/><meta name="ha-url" content="https://collector.githubapp.com/resources/collect"/><meta name="ghcc-locale" content="en-US"/><link rel="apple-touch-icon" sizes="180x180" href="/apple-touch-icon.png"/><link rel="icon" type="image/png" sizes="32x32" href="/favicon-32x32.png"/><link rel="icon" type="image/png" sizes="16x16" href="/favicon-16x16.png"/><link rel="manifest" href="/site.webmanifest"/><link rel="mask-icon" href="/safari-pinned-tab.svg" color="#ab3f8b"/><meta name="apple-mobile-web-app-title" content="GitHub Resources"/><meta name="application-name" content="GitHub Resources"/><meta name="msapplication-TileColor" content="#ab3f8b"/><meta name="theme-color" content="#151920"/><meta name="description" content="From setup to optimization, learn how to use GitHub to get the job done."/><meta name="twitter:card" content="summary_large_image"/><meta name="twitter:site" content="@github"/><meta name="twitter:creator" content="@GitHub"/><meta property="og:description" content="From setup to optimization, learn how to use GitHub to get the job done."/><meta property="og:url" content="https://resources.github.com/topics/security/"/><meta property="og:type" content="website"/><meta property="og:locale" content="en_US"/><meta property="og:image" content="https://resources.github.com/default-og-image.jpg"/><meta property="og:image:alt" content="GitHub Resources"/><meta property="og:image:width" content="1200"/><meta property="og:image:height" content="630"/><meta name="ha-page-type" content="marketing"/><title>Security - GitHub Resources</title><meta name="robots" content="index,follow"/><meta property="og:title" content="Security - GitHub Resources"/><meta property="og:site_name" content="GitHub Resources"/><meta name="next-head-count" content="32"/><link data-next-font="" rel="preconnect" href="/" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/238ca3e7f90c682f.css" as="style"/><link rel="stylesheet" href="/_next/static/css/238ca3e7f90c682f.css" data-n-g=""/><noscript data-n-css=""></noscript><script defer="" nomodule="" src="/_next/static/chunks/polyfills-78c92fac7aa8fdd8.js"></script><script src="https://ghcc.githubassets.com/ghcc.min.js" defer="" data-nscript="beforeInteractive"></script><script src="/_next/static/chunks/webpack-38cee4c0e358b1a3.js" defer=""></script><script src="/_next/static/chunks/framework-49c6cecf1f6d5795.js" defer=""></script><script src="/_next/static/chunks/main-43041a92397b9ba5.js" defer=""></script><script src="/_next/static/chunks/pages/_app-4918fa68b0b899e4.js" defer=""></script><script src="/_next/static/chunks/pages/topics/%5Bslug%5D-3d4606bc4b328bfe.js" defer=""></script><script src="/_next/static/ZokmF09g2SkORXwoG0TZr/_buildManifest.js" defer=""></script><script src="/_next/static/ZokmF09g2SkORXwoG0TZr/_ssgManifest.js" defer=""></script></head><body><div id="__next"><div data-color-mode="light" class="d-flex flex-column"><div id="site-navigation-container" data-color-mode="light" data-light-theme="light" style="z-index:999" class="site-navigation-container position-fixed top-0 width-full color-bg-transparent"><div class="position-relative site-navigation-container--background"><div class="position-absolute nav-dropdown color-bg-white" data-color-mode="light" data-light-theme="light"><div class="container-xl"><form class="d-flex flex-column"><button class="btn-link flex-self-end Link--muted" type="button" aria-label="Close dropdown" data-analytics-click="Search,search pane closed, query: "><svg aria-hidden="true" role="img" class="octicon octicon-x" viewBox="0 0 24 24" width="36" height="36" fill="currentColor" style="display:inline-block;user-select:none;vertical-align:text-bottom;overflow:visible"><path fill-rule="evenodd" d="M5.72 5.72a.75.75 0 011.06 0L12 10.94l5.22-5.22a.75.75 0 111.06 1.06L13.06 12l5.22 5.22a.75.75 0 11-1.06 1.06L12 13.06l-5.22 5.22a.75.75 0 01-1.06-1.06L10.94 12 5.72 6.78a.75.75 0 010-1.06z"></path></svg></button><div class="d-flex flex-column flex-md-row flex-items-center"><input type="text" class="search-input form-control input-lg color-bg-transparent color-fg-muted flex-1 width-full mb-3 mb-md-0 mr-0 mr-md-3" placeholder="What are you looking for?" autofocus="" value=""/><button class="btn-mktg arrow-target-mktg flex-shrink-0 width-full width-md-auto">Search</button></div></form></div></div><ul class="position-absolute nav-dropdown mobile-nav pt-8 pb-4 color-bg-dark color-fg-white d-lg-none" data-color-mode="dark" data-dark-theme="dark"><div class="container-sm px-6 overflow-auto height-full"><div class="d-flex flex-column color-bg-dark height-full flex-justify-between"><div></div><div class="d-flex flex-column d-md-none"></div></div></div></ul><header data-testid="site-navigation-mobile" class="site-navigation d-lg-none"><nav class="container-xl py-1" aria-label="Site navigation"><div class="d-flex flex-items-center flex-justify-between"><a title="Visit GitHub Resources" class="gh-icon Header-link" data-testid="navigation-home-link-mobile" href="/"><svg aria-hidden="true" role="img" class="octicon octicon-mark-github" viewBox="0 0 16 16" width="32" height="32" fill="currentColor" style="display:inline-block;user-select:none;vertical-align:text-bottom;overflow:visible"><path fill-rule="evenodd" d="M8 0C3.58 0 0 3.58 0 8c0 3.54 2.29 6.53 5.47 7.59.4.07.55-.17.55-.38 0-.19-.01-.82-.01-1.49-2.01.37-2.53-.49-2.69-.94-.09-.23-.48-.94-.82-1.13-.28-.15-.68-.52-.01-.53.63-.01 1.08.58 1.23.82.72 1.21 1.87.87 2.33.66.07-.52.28-.87.51-1.07-1.78-.2-3.64-.89-3.64-3.95 0-.87.31-1.59.82-2.15-.08-.2-.36-1.02.08-2.12 0 0 .67-.21 2.2.82.64-.18 1.32-.27 2-.27.68 0 1.36.09 2 .27 1.53-1.04 2.2-.82 2.2-.82.44 1.1.16 1.92.08 2.12.51.56.82 1.27.82 2.15 0 3.07-1.87 3.75-3.65 3.95.29.25.54.73.54 1.48 0 1.07-.01 1.93-.01 2.2 0 .21.15.46.55.38A8.013 8.013 0 0016 8c0-4.42-3.58-8-8-8z"></path></svg></a><div class="d-none d-md-flex d-lg-none"></div></div></nav></header><header data-testid="site-navigation" class="site-navigation"><nav class="container-xl py-1 d-none d-lg-flex flex-items-center flex-justify-between" aria-label="Site navigation"><ul class="d-flex flex-items-center"><li><a href="https://github.com" target="_blank" rel="noreferrer" class="gh-icon Header-link d-none d-lg-block py-3 position-relative" aria-label="GitHub homepage"><svg aria-hidden="true" role="img" class="nav-back-arrow position-absolute" viewBox="0 0 24 24" width="32" height="32" fill="currentColor" style="display:inline-block;user-select:none;vertical-align:text-bottom;overflow:visible"><path fill-rule="evenodd" d="M15.28 5.22a.75.75 0 00-1.06 0l-6.25 6.25a.75.75 0 000 1.06l6.25 6.25a.75.75 0 101.06-1.06L9.56 12l5.72-5.72a.75.75 0 000-1.06z"></path></svg><svg aria-hidden="true" role="img" class="octicon octicon-mark-github" viewBox="0 0 16 16" width="32" height="32" fill="currentColor" style="display:inline-block;user-select:none;vertical-align:text-bottom;overflow:visible"><path fill-rule="evenodd" d="M8 0C3.58 0 0 3.58 0 8c0 3.54 2.29 6.53 5.47 7.59.4.07.55-.17.55-.38 0-.19-.01-.82-.01-1.49-2.01.37-2.53-.49-2.69-.94-.09-.23-.48-.94-.82-1.13-.28-.15-.68-.52-.01-.53.63-.01 1.08.58 1.23.82.72 1.21 1.87.87 2.33.66.07-.52.28-.87.51-1.07-1.78-.2-3.64-.89-3.64-3.95 0-.87.31-1.59.82-2.15-.08-.2-.36-1.02.08-2.12 0 0 .67-.21 2.2.82.64-.18 1.32-.27 2-.27.68 0 1.36.09 2 .27 1.53-1.04 2.2-.82 2.2-.82.44 1.1.16 1.92.08 2.12.51.56.82 1.27.82 2.15 0 3.07-1.87 3.75-3.65 3.95.29.25.54.73.54 1.48 0 1.07-.01 1.93-.01 2.2 0 .21.15.46.55.38A8.013 8.013 0 0016 8c0-4.42-3.58-8-8-8z"></path></svg></a></li><li class="d-flex flex-items-center"><span class="ml-3 f1-mktg f2-md-mktg opacity-30">/</span><a data-testid="navigation-home-link" data-analytics-click="Navigation, go to homepage" class="d-none d-lg-inline-block Header-link font-weight-semibold p-3 f2" aria-label="GitHub resources homepage" href="/">Resources</a></li></ul><ul class="d-flex flex-items-center"></ul><div class="site-navigation--background position-absolute top-0 bottom-0 left-0 right-0"></div></nav></header></div></div><main class="flex-1 position-relative"><section class="section"><div class="container-xl"><h1 class="h3-mktg mb-3">Security</h1><div class="d-flex flex-items-start" data-testid="page-thumbnail-list"><aside class="articles-sidebar sidebar d-none d-md-block"><div class="mb-4 d-flex flex-column flex-items-start"><h3 class="text-mono gradient-fg-purple-red f4-mktg mb-3">Type</h3><a class="py-1 mb-1 Link--primary link-mktg arrow-target-mktg font-weight-medium color-fg-accent" href="/topics/security/">All types<!-- --> (<!-- -->34<!-- -->)<svg aria-hidden="true" role="presentation" xmlns="http://www.w3.org/2000/svg" class="octicon arrow-symbol-mktg" width="16" height="16" viewBox="0 0 16 16" fill="none"><path fill="currentColor" d="M7.28033 3.21967C6.98744 2.92678 6.51256 2.92678 6.21967 3.21967C5.92678 3.51256 5.92678 3.98744 6.21967 4.28033L7.28033 3.21967ZM11 8L11.5303 8.53033C11.8232 8.23744 11.8232 7.76256 11.5303 7.46967L11 8ZM6.21967 11.7197C5.92678 12.0126 5.92678 12.4874 6.21967 12.7803C6.51256 13.0732 6.98744 13.0732 7.28033 12.7803L6.21967 11.7197ZM6.21967 4.28033L10.4697 8.53033L11.5303 7.46967L7.28033 3.21967L6.21967 4.28033ZM10.4697 7.46967L6.21967 11.7197L7.28033 12.7803L11.5303 8.53033L10.4697 7.46967Z"></path><path stroke="currentColor" d="M1.75 8H11" stroke-width="1.5" stroke-linecap="round"></path></svg></a><a class="py-1 mb-1 Link--primary link-mktg arrow-target-mktg font-weight-medium " href="/topics/security/?type=video">Videos<!-- --> (<!-- -->14<!-- -->)</a><a class="py-1 mb-1 Link--primary link-mktg arrow-target-mktg font-weight-medium " href="/topics/security/?type=article">Articles<!-- --> (<!-- -->11<!-- -->)</a><a class="py-1 mb-1 Link--primary link-mktg arrow-target-mktg font-weight-medium " href="/topics/security/?type=event">Events<!-- --> (<!-- -->9<!-- -->)</a></div></aside><div class="Layout-main"><div class="grid grid-cols-1 grid-cols-md-2 gap-8"><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: AI Will Not Replace Software Engineers (and May, in Fact, Require More)" href="/artificial-intelligence/gartner-ai-will-not-replace-software-engineers/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="/assets/images/defaults/default-2.png?w=544&amp;q=75 544w, /assets/images/defaults/default-2.png?w=768&amp;q=75 768w, /assets/images/defaults/default-2.png?w=1012&amp;q=75 1012w, /assets/images/defaults/default-2.png?w=1280&amp;q=75 1280w" src="/assets/images/defaults/default-2.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>AI Will Not Replace Software Engineers (and May, in Fact, Require More)</span></h3><time class="text-mono mb-3 color-fg-muted">September 26, 2024</time><p class="f3-mktg color-fg-muted">Explore the current and future impact of AI on developers and see why humans will always be essential to delivering innovative software in this report. </p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/github-advanced-security/">GitHub Advanced Security</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/devops/">DevOps</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/integrations/">Integrations</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/github-actions/">GitHub Actions</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: DevSecOps explained" href="/devops/fundamentals/devsecops/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="//images.ctfassets.net/wfutmusr1t3h/4h4pRGrs2KDTg0fBoUPTc3/82068b450fb4cd43ca4b5b217d6cfe2b/Productivity-DarkMode-3.webp?w=544&amp;q=75 544w, //images.ctfassets.net/wfutmusr1t3h/4h4pRGrs2KDTg0fBoUPTc3/82068b450fb4cd43ca4b5b217d6cfe2b/Productivity-DarkMode-3.webp?w=768&amp;q=75 768w, //images.ctfassets.net/wfutmusr1t3h/4h4pRGrs2KDTg0fBoUPTc3/82068b450fb4cd43ca4b5b217d6cfe2b/Productivity-DarkMode-3.webp?w=1012&amp;q=75 1012w, //images.ctfassets.net/wfutmusr1t3h/4h4pRGrs2KDTg0fBoUPTc3/82068b450fb4cd43ca4b5b217d6cfe2b/Productivity-DarkMode-3.webp?w=1280&amp;q=75 1280w" src="//images.ctfassets.net/wfutmusr1t3h/4h4pRGrs2KDTg0fBoUPTc3/82068b450fb4cd43ca4b5b217d6cfe2b/Productivity-DarkMode-3.webp?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>DevSecOps explained</span></h3><time class="text-mono mb-3 color-fg-muted">May 23, 2022</time><p class="f3-mktg color-fg-muted">DevSecOps builds on the ideas of DevOps by applying security practices throughout the software development lifecycle to ship more secure code faster.</p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: Build Stuff Lithuania" href="/events/build-stuff-lithuania-2024/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="//images.ctfassets.net/wfutmusr1t3h/48Dc1TpQ1JECrd3O0Zm2VZ/6b29f979ed60be99a49672d2a188ab26/BuildStuff.png?w=544&amp;q=75 544w, //images.ctfassets.net/wfutmusr1t3h/48Dc1TpQ1JECrd3O0Zm2VZ/6b29f979ed60be99a49672d2a188ab26/BuildStuff.png?w=768&amp;q=75 768w, //images.ctfassets.net/wfutmusr1t3h/48Dc1TpQ1JECrd3O0Zm2VZ/6b29f979ed60be99a49672d2a188ab26/BuildStuff.png?w=1012&amp;q=75 1012w, //images.ctfassets.net/wfutmusr1t3h/48Dc1TpQ1JECrd3O0Zm2VZ/6b29f979ed60be99a49672d2a188ab26/BuildStuff.png?w=1280&amp;q=75 1280w" src="//images.ctfassets.net/wfutmusr1t3h/48Dc1TpQ1JECrd3O0Zm2VZ/6b29f979ed60be99a49672d2a188ab26/BuildStuff.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>Build Stuff Lithuania</span></h3><time class="text-mono mb-3 color-fg-muted">September 6, 2024</time><p class="f3-mktg color-fg-muted">#1 Software Development Conference for Developers, Software Architects, and Tech team leads</p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/github-advanced-security/">GitHub Advanced Security</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/security-lab/">Security Lab</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: Devoxx Belgium 2024" href="/events/devoxx-belgium-2024/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="//images.ctfassets.net/wfutmusr1t3h/2PbLYsOL4kK0KdgXFWqaL3/8b51e965e9a86e09d6843b353d12bba6/devoxxBelgium2024.png?w=544&amp;q=75 544w, //images.ctfassets.net/wfutmusr1t3h/2PbLYsOL4kK0KdgXFWqaL3/8b51e965e9a86e09d6843b353d12bba6/devoxxBelgium2024.png?w=768&amp;q=75 768w, //images.ctfassets.net/wfutmusr1t3h/2PbLYsOL4kK0KdgXFWqaL3/8b51e965e9a86e09d6843b353d12bba6/devoxxBelgium2024.png?w=1012&amp;q=75 1012w, //images.ctfassets.net/wfutmusr1t3h/2PbLYsOL4kK0KdgXFWqaL3/8b51e965e9a86e09d6843b353d12bba6/devoxxBelgium2024.png?w=1280&amp;q=75 1280w" src="//images.ctfassets.net/wfutmusr1t3h/2PbLYsOL4kK0KdgXFWqaL3/8b51e965e9a86e09d6843b353d12bba6/devoxxBelgium2024.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>Devoxx Belgium 2024</span></h3><time class="text-mono mb-3 color-fg-muted">September 6, 2024</time><p class="f3-mktg color-fg-muted">Devoxx Belgium 2024 (21st edition), a 5-day technology conference, is expected to draw over 3,500 attendees. With tickets selling out in just a few seconds last year, we anticipate the same level of excitement and rapid sell-out this year!</p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/devops/">DevOps</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/software-development/">Software Development</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/github-advanced-security/">GitHub Advanced Security</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/ai/">AI</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/security-lab/">Security Lab</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: OrangeCon" href="/events/orange-con-2024/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="//images.ctfassets.net/wfutmusr1t3h/QpcTjfjZjWHKeAsy3MC2Z/7475d6a49211986214ecc5299af14c0f/Screenshot_2024-09-04_at_22.53.52.png?w=544&amp;q=75 544w, //images.ctfassets.net/wfutmusr1t3h/QpcTjfjZjWHKeAsy3MC2Z/7475d6a49211986214ecc5299af14c0f/Screenshot_2024-09-04_at_22.53.52.png?w=768&amp;q=75 768w, //images.ctfassets.net/wfutmusr1t3h/QpcTjfjZjWHKeAsy3MC2Z/7475d6a49211986214ecc5299af14c0f/Screenshot_2024-09-04_at_22.53.52.png?w=1012&amp;q=75 1012w, //images.ctfassets.net/wfutmusr1t3h/QpcTjfjZjWHKeAsy3MC2Z/7475d6a49211986214ecc5299af14c0f/Screenshot_2024-09-04_at_22.53.52.png?w=1280&amp;q=75 1280w" src="//images.ctfassets.net/wfutmusr1t3h/QpcTjfjZjWHKeAsy3MC2Z/7475d6a49211986214ecc5299af14c0f/Screenshot_2024-09-04_at_22.53.52.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>OrangeCon</span></h3><time class="text-mono mb-3 color-fg-muted">September 4, 2024</time><p class="f3-mktg color-fg-muted">The New Dutch Cybersecurity Conference</p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/github-advanced-security/">GitHub Advanced Security</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/tools/">Tools</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/security-lab/">Security Lab</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: SOSS Community Day Europe" href="/events/soss-community-day-eu-2024/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="//images.ctfassets.net/wfutmusr1t3h/3AaasB0HDcygJBseCON2FI/67f268b155d75c6ae548d3bd6c4a1c0b/SOSS.png?w=544&amp;q=75 544w, //images.ctfassets.net/wfutmusr1t3h/3AaasB0HDcygJBseCON2FI/67f268b155d75c6ae548d3bd6c4a1c0b/SOSS.png?w=768&amp;q=75 768w, //images.ctfassets.net/wfutmusr1t3h/3AaasB0HDcygJBseCON2FI/67f268b155d75c6ae548d3bd6c4a1c0b/SOSS.png?w=1012&amp;q=75 1012w, //images.ctfassets.net/wfutmusr1t3h/3AaasB0HDcygJBseCON2FI/67f268b155d75c6ae548d3bd6c4a1c0b/SOSS.png?w=1280&amp;q=75 1280w" src="//images.ctfassets.net/wfutmusr1t3h/3AaasB0HDcygJBseCON2FI/67f268b155d75c6ae548d3bd6c4a1c0b/SOSS.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>SOSS Community Day Europe</span></h3><time class="text-mono mb-3 color-fg-muted">September 5, 2024</time><p class="f3-mktg color-fg-muted">Secure Open Source Software (SOSS) Community Days are an opportunity for Community Members from across the Security and Open Source ecosystem to get together and share ideas and progress on capabilities that make it easier to sustainably secure the development, maintenance, and consumption of the open source software (OSS) we all depend on.</p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/opensource/">Open Source</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/github-advanced-security/">GitHub Advanced Security</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/security-lab/">Security Lab</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: GitHub Universe 2024" href="/events/universe/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="//images.ctfassets.net/wfutmusr1t3h/2sX2KYqfnGuZTqWIDUUdEI/5e36aaaab860a3bd4e026fa52d597d87/og-image-24.jpg?w=544&amp;q=75 544w, //images.ctfassets.net/wfutmusr1t3h/2sX2KYqfnGuZTqWIDUUdEI/5e36aaaab860a3bd4e026fa52d597d87/og-image-24.jpg?w=768&amp;q=75 768w, //images.ctfassets.net/wfutmusr1t3h/2sX2KYqfnGuZTqWIDUUdEI/5e36aaaab860a3bd4e026fa52d597d87/og-image-24.jpg?w=1012&amp;q=75 1012w, //images.ctfassets.net/wfutmusr1t3h/2sX2KYqfnGuZTqWIDUUdEI/5e36aaaab860a3bd4e026fa52d597d87/og-image-24.jpg?w=1280&amp;q=75 1280w" src="//images.ctfassets.net/wfutmusr1t3h/2sX2KYqfnGuZTqWIDUUdEI/5e36aaaab860a3bd4e026fa52d597d87/og-image-24.jpg?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>GitHub Universe 2024</span></h3><time class="text-mono mb-3 color-fg-muted">July 29, 2024</time><p class="f3-mktg color-fg-muted">Join us for the 10th anniversary of GitHub Universe on October 29-30 in San Francisco, CA, or virtually, to experience the magic of the world’s fair of software. </p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/ai/">AI</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/devops/">DevOps</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: GitHub Secure Open Source Fund" href="/github-secure-open-source-fund/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="//images.ctfassets.net/wfutmusr1t3h/3w2kJgNDag4FtnK5xUQANd/92f9851db8ca84061ed7d12dea0a9461/Security_Sponsors_Page_4.webp?w=544&amp;q=75 544w, //images.ctfassets.net/wfutmusr1t3h/3w2kJgNDag4FtnK5xUQANd/92f9851db8ca84061ed7d12dea0a9461/Security_Sponsors_Page_4.webp?w=768&amp;q=75 768w, //images.ctfassets.net/wfutmusr1t3h/3w2kJgNDag4FtnK5xUQANd/92f9851db8ca84061ed7d12dea0a9461/Security_Sponsors_Page_4.webp?w=1012&amp;q=75 1012w, //images.ctfassets.net/wfutmusr1t3h/3w2kJgNDag4FtnK5xUQANd/92f9851db8ca84061ed7d12dea0a9461/Security_Sponsors_Page_4.webp?w=1280&amp;q=75 1280w" src="//images.ctfassets.net/wfutmusr1t3h/3w2kJgNDag4FtnK5xUQANd/92f9851db8ca84061ed7d12dea0a9461/Security_Sponsors_Page_4.webp?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>GitHub Secure Open Source Fund</span></h3><p class="f3-mktg color-fg-muted">Powered by GitHub Sponsors</p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/opensource/">Open Source</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: GitHub named a &#x27;Major Player&#x27; in new IDC MarketScape" href="/idc-marketscape/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="/assets/images/defaults/default-11.png?w=544&amp;q=75 544w, /assets/images/defaults/default-11.png?w=768&amp;q=75 768w, /assets/images/defaults/default-11.png?w=1012&amp;q=75 1012w, /assets/images/defaults/default-11.png?w=1280&amp;q=75 1280w" src="/assets/images/defaults/default-11.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>GitHub named a &#x27;Major Player&#x27; in new IDC MarketScape</span></h3><time class="text-mono mb-3 color-fg-muted">May 16, 2022</time><p class="f3-mktg color-fg-muted">Read the report excerpt for recent trends in application security testing and to learn more about why GitHub was named a Major Player.</p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/github-advanced-security/">GitHub Advanced Security</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: Secure at every step" href="/learn/pathways/security/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="//images.ctfassets.net/wfutmusr1t3h/7f9pgRe8iwpqx089sDD7yU/e8a8b5c67a16c69195ce81de391c569f/Security_Thumbnail_Small_616x424px-2_1.png?w=544&amp;q=75 544w, //images.ctfassets.net/wfutmusr1t3h/7f9pgRe8iwpqx089sDD7yU/e8a8b5c67a16c69195ce81de391c569f/Security_Thumbnail_Small_616x424px-2_1.png?w=768&amp;q=75 768w, //images.ctfassets.net/wfutmusr1t3h/7f9pgRe8iwpqx089sDD7yU/e8a8b5c67a16c69195ce81de391c569f/Security_Thumbnail_Small_616x424px-2_1.png?w=1012&amp;q=75 1012w, //images.ctfassets.net/wfutmusr1t3h/7f9pgRe8iwpqx089sDD7yU/e8a8b5c67a16c69195ce81de391c569f/Security_Thumbnail_Small_616x424px-2_1.png?w=1280&amp;q=75 1280w" src="//images.ctfassets.net/wfutmusr1t3h/7f9pgRe8iwpqx089sDD7yU/e8a8b5c67a16c69195ce81de391c569f/Security_Thumbnail_Small_616x424px-2_1.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>Secure at every step</span></h3><p class="f3-mktg color-fg-muted">Learn how industry experts use GitHub Advanced Security to protect their code without sacrificing developer productivity</p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: Fireside Chat: Unleash the power of open source securely" href="/open-source/secure-devops/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="/assets/images/defaults/default-13.png?w=544&amp;q=75 544w, /assets/images/defaults/default-13.png?w=768&amp;q=75 768w, /assets/images/defaults/default-13.png?w=1012&amp;q=75 1012w, /assets/images/defaults/default-13.png?w=1280&amp;q=75 1280w" src="/assets/images/defaults/default-13.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>Fireside Chat: Unleash the power of open source securely</span></h3><time class="text-mono mb-3 color-fg-muted">April 22, 2021</time><p class="f3-mktg color-fg-muted">Open source software is the essential building block for any modern software project. Consuming open source securely and contributing back to the community have invaluable benefits at individual and organizational levels.&lt;br&gt;&lt;br&gt;Join our fireside chat with IAG, Woolworths and GitHub experts as we discuss the pillars of a successful open source strategy including DevOps and security.</p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/devops/">DevOps</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/opensource/">Open Source</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: Appsec Talk - Hashicorp" href="/security/advanced-security-bites/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="//images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png?w=544&amp;q=75 544w, //images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png?w=768&amp;q=75 768w, //images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png?w=1012&amp;q=75 1012w, //images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png?w=1280&amp;q=75 1280w" src="//images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>Appsec Talk - Hashicorp</span></h3><time class="text-mono mb-3 color-fg-muted">August 17, 2022</time><p class="f3-mktg color-fg-muted"> How Hashicorp secures their code </p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/github-advanced-security/">GitHub Advanced Security</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: A checklist for AI-powered DevSecOps" href="/security/ai-powered-devsecops-checklist/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="//images.ctfassets.net/wfutmusr1t3h/3brGEQk2zC0BIWfpZFFQI3/368db18eb3764b08fe0e24005f513881/Security-DarkMode-1_1.png?w=544&amp;q=75 544w, //images.ctfassets.net/wfutmusr1t3h/3brGEQk2zC0BIWfpZFFQI3/368db18eb3764b08fe0e24005f513881/Security-DarkMode-1_1.png?w=768&amp;q=75 768w, //images.ctfassets.net/wfutmusr1t3h/3brGEQk2zC0BIWfpZFFQI3/368db18eb3764b08fe0e24005f513881/Security-DarkMode-1_1.png?w=1012&amp;q=75 1012w, //images.ctfassets.net/wfutmusr1t3h/3brGEQk2zC0BIWfpZFFQI3/368db18eb3764b08fe0e24005f513881/Security-DarkMode-1_1.png?w=1280&amp;q=75 1280w" src="//images.ctfassets.net/wfutmusr1t3h/3brGEQk2zC0BIWfpZFFQI3/368db18eb3764b08fe0e24005f513881/Security-DarkMode-1_1.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>A checklist for AI-powered DevSecOps</span></h3><time class="text-mono mb-3 color-fg-muted">April 30, 2024</time><p class="f3-mktg color-fg-muted">Simply bolting security tools onto a developer’s workflow can create friction, and make it difficult to detect and remediate vulnerabilities. Here’s where AI can help. In this checklist, we’ll show you where and how to integrate AI and automation into your software supply chain.</p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: Application Security explained: Downloadable guide to learn how to put the developer first" href="/security/application-security-guide%20(testing%20template)/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="/assets/images/defaults/default-3.png?w=544&amp;q=75 544w, /assets/images/defaults/default-3.png?w=768&amp;q=75 768w, /assets/images/defaults/default-3.png?w=1012&amp;q=75 1012w, /assets/images/defaults/default-3.png?w=1280&amp;q=75 1280w" src="/assets/images/defaults/default-3.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>Application Security explained: Downloadable guide to learn how to put the developer first</span></h3><time class="text-mono mb-3 color-fg-muted">July 21, 2020</time><p class="f3-mktg color-fg-muted">Put developers front and center for application security and drive down the number of vulnerabilities in production code. Download this PDF guide to learn more.</p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: Application security testing" href="/security/application-security-testing/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="//images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png?w=544&amp;q=75 544w, //images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png?w=768&amp;q=75 768w, //images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png?w=1012&amp;q=75 1012w, //images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png?w=1280&amp;q=75 1280w" src="//images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>Application security testing</span></h3><p class="f3-mktg color-fg-muted">Application security testing (AST) is the process of making applications more resilient to security threats by evaluating the application to identify potential vulnerabilities that can be exploited. Although organizations have invested billions of dollars into application security, web applications are still vulnerable to a range of cyberattacks. To keep software safe, it’s important to use application security testing tools. </p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: Complex, siloed, slow: Top AppSec pitfalls and how to avoid them" href="/security/appsec-pitfalls/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="/assets/images/defaults/default-5.png?w=544&amp;q=75 544w, /assets/images/defaults/default-5.png?w=768&amp;q=75 768w, /assets/images/defaults/default-5.png?w=1012&amp;q=75 1012w, /assets/images/defaults/default-5.png?w=1280&amp;q=75 1280w" src="/assets/images/defaults/default-5.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>Complex, siloed, slow: Top AppSec pitfalls and how to avoid them</span></h3><time class="text-mono mb-3 color-fg-muted">February 26, 2020</time><p class="f3-mktg color-fg-muted">Secure software is critical for organizations to stay in business today. But security can be easier said than done—due to the complexity, siloed teams, and slow processes.</p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: Incorporating community-powered security into the developer workflow" href="/security/community-powered-security-developer-workflow/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="/assets/images/defaults/default-6.png?w=544&amp;q=75 544w, /assets/images/defaults/default-6.png?w=768&amp;q=75 768w, /assets/images/defaults/default-6.png?w=1012&amp;q=75 1012w, /assets/images/defaults/default-6.png?w=1280&amp;q=75 1280w" src="/assets/images/defaults/default-6.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>Incorporating community-powered security into the developer workflow</span></h3><time class="text-mono mb-3 color-fg-muted">October 3, 2019</time><p class="f3-mktg color-fg-muted">What if you could have an extra team member who reviews each pull request, with a special eye towards security? A team member who knows all the latest security research, and gives helpful feedback, making security part of your engineering culture?</p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/innersource/">Innersource</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: Demo Day: Achieving DevSecOps with GitHub Advanced Security" href="/security/ghas/achieving-devsecops-with-advanced-security/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="/assets/images/defaults/default-7.png?w=544&amp;q=75 544w, /assets/images/defaults/default-7.png?w=768&amp;q=75 768w, /assets/images/defaults/default-7.png?w=1012&amp;q=75 1012w, /assets/images/defaults/default-7.png?w=1280&amp;q=75 1280w" src="/assets/images/defaults/default-7.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>Demo Day: Achieving DevSecOps with GitHub Advanced Security</span></h3><time class="text-mono mb-3 color-fg-muted">March 30, 2021</time><p class="f3-mktg color-fg-muted">Get hands-on support for the next step of your DevSecOps journey. Join us for a technical deep dive into GitHub Advanced Security with a step-by-step demo on features like code scanning and secret scanning—and a look at what this means for baking security into the developer workflow.</p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/github-advanced-security/">GitHub Advanced Security</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: Integrating GitHub Advanced Security with third party reporting and analytics platforms" href="/security/integrating-github-advanced-security-with-third-party-platforms/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="/assets/images/defaults/default-8.png?w=544&amp;q=75 544w, /assets/images/defaults/default-8.png?w=768&amp;q=75 768w, /assets/images/defaults/default-8.png?w=1012&amp;q=75 1012w, /assets/images/defaults/default-8.png?w=1280&amp;q=75 1280w" src="/assets/images/defaults/default-8.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>Integrating GitHub Advanced Security with third party reporting and analytics platforms</span></h3><time class="text-mono mb-3 color-fg-muted">September 7, 2022</time><p class="f3-mktg color-fg-muted">This document is intended to capture strategies for integrating and ingesting alerts from the GitHub Advanced Security (GHAS) platform into external reporting, Security Information and Event Management (SIEM) services, and vulnerability analytics platforms.</p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: Solving for a security-first approach: building blocks for scalable product security" href="/security/product/building-blocks-product-security/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="/assets/images/defaults/default-9.png?w=544&amp;q=75 544w, /assets/images/defaults/default-9.png?w=768&amp;q=75 768w, /assets/images/defaults/default-9.png?w=1012&amp;q=75 1012w, /assets/images/defaults/default-9.png?w=1280&amp;q=75 1280w" src="/assets/images/defaults/default-9.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>Solving for a security-first approach: building blocks for scalable product security</span></h3><time class="text-mono mb-3 color-fg-muted">May 23, 2019</time><p class="f3-mktg color-fg-muted">Cybersecurity is facing its watershed moment. As developer release cycles are accelerating, organizations are quickly realizing there are simply not enough skilled security engineers available to protect their code.</p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: Adopting and scaling GitHub Advanced Security in your company" href="/security/scaling-github-advanced-security/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="/assets/images/defaults/default-10.png?w=544&amp;q=75 544w, /assets/images/defaults/default-10.png?w=768&amp;q=75 768w, /assets/images/defaults/default-10.png?w=1012&amp;q=75 1012w, /assets/images/defaults/default-10.png?w=1280&amp;q=75 1280w" src="/assets/images/defaults/default-10.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>Adopting and scaling GitHub Advanced Security in your company</span></h3><time class="text-mono mb-3 color-fg-muted">November 18, 2021</time><p class="f3-mktg color-fg-muted">Let&#x27;s talk about how you can scale and adopt GitHub Advanced Security in an automated and structured fashion</p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/github-advanced-security/">GitHub Advanced Security</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: Secure software development strategy essentials" href="/security/software-development-strategy-essentials/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="/assets/images/defaults/default-11.png?w=544&amp;q=75 544w, /assets/images/defaults/default-11.png?w=768&amp;q=75 768w, /assets/images/defaults/default-11.png?w=1012&amp;q=75 1012w, /assets/images/defaults/default-11.png?w=1280&amp;q=75 1280w" src="/assets/images/defaults/default-11.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>Secure software development strategy essentials</span></h3><time class="text-mono mb-3 color-fg-muted">November 18, 2018</time><p class="f3-mktg color-fg-muted">Trust is the foundation of the relationship between software companies and their customers. The ability to prevent sensitive data from falling into the wrong hands is a cornerstone of this trust.</p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: How developer-first supply chain security helps you ship secure software fast" href="/security/supply-chain-security/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="//images.ctfassets.net/wfutmusr1t3h/6KjIFfi4p8DYEohiLFERbW/e2bbcfc88ebf82cf8bc9be17d86279d6/sec.png?w=544&amp;q=75 544w, //images.ctfassets.net/wfutmusr1t3h/6KjIFfi4p8DYEohiLFERbW/e2bbcfc88ebf82cf8bc9be17d86279d6/sec.png?w=768&amp;q=75 768w, //images.ctfassets.net/wfutmusr1t3h/6KjIFfi4p8DYEohiLFERbW/e2bbcfc88ebf82cf8bc9be17d86279d6/sec.png?w=1012&amp;q=75 1012w, //images.ctfassets.net/wfutmusr1t3h/6KjIFfi4p8DYEohiLFERbW/e2bbcfc88ebf82cf8bc9be17d86279d6/sec.png?w=1280&amp;q=75 1280w" src="//images.ctfassets.net/wfutmusr1t3h/6KjIFfi4p8DYEohiLFERbW/e2bbcfc88ebf82cf8bc9be17d86279d6/sec.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>How developer-first supply chain security helps you ship secure software fast</span></h3><time class="text-mono mb-3 color-fg-muted">July 14, 2022</time><p class="f3-mktg color-fg-muted">Discover why supply chain security is needed and how GitHub’s supply chain security tool can help you ship secure software quickly. </p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: Shipping fast with a secure supply chain on GitHub" href="/security/supply-chain/shipping-fast-secure-supply-chain/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="//images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png?w=544&amp;q=75 544w, //images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png?w=768&amp;q=75 768w, //images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png?w=1012&amp;q=75 1012w, //images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png?w=1280&amp;q=75 1280w" src="//images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>Shipping fast with a secure supply chain on GitHub</span></h3><time class="text-mono mb-3 color-fg-muted">August 27, 2020</time><p class="f3-mktg color-fg-muted">Following DevSecOps means approaching security as an ongoing part of software development—and staying up to date on the code your software depends on.</p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: The enterprise guide to AI-powered DevSecOps " href="/security/the-enterprise-guide-to-ai-powered-devsecops/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="//images.ctfassets.net/wfutmusr1t3h/1Lp1iXfQeQ3VE3IOE578rk/839fcb217cf6f7c8ae7e4a5e8fc395ab/290327022-96b47c64-07a8-48fa-8575-12098888dac8.png?w=544&amp;q=75 544w, //images.ctfassets.net/wfutmusr1t3h/1Lp1iXfQeQ3VE3IOE578rk/839fcb217cf6f7c8ae7e4a5e8fc395ab/290327022-96b47c64-07a8-48fa-8575-12098888dac8.png?w=768&amp;q=75 768w, //images.ctfassets.net/wfutmusr1t3h/1Lp1iXfQeQ3VE3IOE578rk/839fcb217cf6f7c8ae7e4a5e8fc395ab/290327022-96b47c64-07a8-48fa-8575-12098888dac8.png?w=1012&amp;q=75 1012w, //images.ctfassets.net/wfutmusr1t3h/1Lp1iXfQeQ3VE3IOE578rk/839fcb217cf6f7c8ae7e4a5e8fc395ab/290327022-96b47c64-07a8-48fa-8575-12098888dac8.png?w=1280&amp;q=75 1280w" src="//images.ctfassets.net/wfutmusr1t3h/1Lp1iXfQeQ3VE3IOE578rk/839fcb217cf6f7c8ae7e4a5e8fc395ab/290327022-96b47c64-07a8-48fa-8575-12098888dac8.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>The enterprise guide to AI-powered DevSecOps </span></h3><time class="text-mono mb-3 color-fg-muted">December 13, 2023</time><p class="f3-mktg color-fg-muted">DevSecOps is an approach to software development that integrates security throughout the software development life cycle (SDLC). In this guide, we’ll share core challenges when it comes to implementing DevSecOps, and how you can start addressing them with AI and automation.</p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: Three AppSec pitfalls every security leader can avoid" href="/security/three-appsec-pitfalls-security/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="/assets/images/defaults/default-2.png?w=544&amp;q=75 544w, /assets/images/defaults/default-2.png?w=768&amp;q=75 768w, /assets/images/defaults/default-2.png?w=1012&amp;q=75 1012w, /assets/images/defaults/default-2.png?w=1280&amp;q=75 1280w" src="/assets/images/defaults/default-2.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>Three AppSec pitfalls every security leader can avoid</span></h3><time class="text-mono mb-3 color-fg-muted">March 5, 2020</time><p class="f3-mktg color-fg-muted">Secure software is critical for business success today. Here are some common application security pitfalls every software team can watch out for.</p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: Transforming application security with AI" href="/security/transforming-application-security-with-ai/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="//images.ctfassets.net/wfutmusr1t3h/6v54PXbBZX0xxf9VOsa0Mz/e6410794410dc15ade67649b91e0ca56/2fa528dc-4acb-46a3-85f1-4d31b38a15f0-1200x630.png?w=544&amp;q=75 544w, //images.ctfassets.net/wfutmusr1t3h/6v54PXbBZX0xxf9VOsa0Mz/e6410794410dc15ade67649b91e0ca56/2fa528dc-4acb-46a3-85f1-4d31b38a15f0-1200x630.png?w=768&amp;q=75 768w, //images.ctfassets.net/wfutmusr1t3h/6v54PXbBZX0xxf9VOsa0Mz/e6410794410dc15ade67649b91e0ca56/2fa528dc-4acb-46a3-85f1-4d31b38a15f0-1200x630.png?w=1012&amp;q=75 1012w, //images.ctfassets.net/wfutmusr1t3h/6v54PXbBZX0xxf9VOsa0Mz/e6410794410dc15ade67649b91e0ca56/2fa528dc-4acb-46a3-85f1-4d31b38a15f0-1200x630.png?w=1280&amp;q=75 1280w" src="//images.ctfassets.net/wfutmusr1t3h/6v54PXbBZX0xxf9VOsa0Mz/e6410794410dc15ade67649b91e0ca56/2fa528dc-4acb-46a3-85f1-4d31b38a15f0-1200x630.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>Transforming application security with AI</span></h3><time class="text-mono mb-3 color-fg-muted">January 17, 2024</time><p class="f3-mktg color-fg-muted">From prevention to remediation, AI-assisted tooling changes everything. The future of secure software development is here. Let’s dive in. </p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/ai/">AI</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: Application Security 3.0" href="/security/virtual-summit/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="//images.ctfassets.net/wfutmusr1t3h/7xuRD3AFLtWt2ztUC0z1ag/21080b1c7cff9c9ec69516b836f650b4/237482938-e50a7dd3-3951-4920-9dfe-a8c201d87a1e__1_.png?w=544&amp;q=75 544w, //images.ctfassets.net/wfutmusr1t3h/7xuRD3AFLtWt2ztUC0z1ag/21080b1c7cff9c9ec69516b836f650b4/237482938-e50a7dd3-3951-4920-9dfe-a8c201d87a1e__1_.png?w=768&amp;q=75 768w, //images.ctfassets.net/wfutmusr1t3h/7xuRD3AFLtWt2ztUC0z1ag/21080b1c7cff9c9ec69516b836f650b4/237482938-e50a7dd3-3951-4920-9dfe-a8c201d87a1e__1_.png?w=1012&amp;q=75 1012w, //images.ctfassets.net/wfutmusr1t3h/7xuRD3AFLtWt2ztUC0z1ag/21080b1c7cff9c9ec69516b836f650b4/237482938-e50a7dd3-3951-4920-9dfe-a8c201d87a1e__1_.png?w=1280&amp;q=75 1280w" src="//images.ctfassets.net/wfutmusr1t3h/7xuRD3AFLtWt2ztUC0z1ag/21080b1c7cff9c9ec69516b836f650b4/237482938-e50a7dd3-3951-4920-9dfe-a8c201d87a1e__1_.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>Application Security 3.0</span></h3><time class="text-mono mb-3 color-fg-muted">May 4, 2023</time><p class="f3-mktg color-fg-muted">Discover how to proactively secure your software and defend against potential threats at our virtual summit, now available on demand! Gain valuable insights and practical strategies to enhance your code security and reduce risk with industry experts from 42Crunch, NowSecure, and Nucleus Security.</p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/github-advanced-security/">GitHub Advanced Security</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: What is application security and how does it work?" href="/security/what-is-application-security/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="//images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png?w=544&amp;q=75 544w, //images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png?w=768&amp;q=75 768w, //images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png?w=1012&amp;q=75 1012w, //images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png?w=1280&amp;q=75 1280w" src="//images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>What is application security and how does it work?</span></h3><p class="f3-mktg color-fg-muted">Application security, sometimes shortened to AppSec, refers to the security measures used to protect software from unauthorized access, use, disclosure, disruption, modification, or destruction. The practice of AppSec implements safeguards and controls to protect software from cyberthreats, and to ensure the confidentiality, integrity, and availability of the application and its data. </p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: Dynamic application security testing (DAST)" href="/security/what-is-dast/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="//images.ctfassets.net/wfutmusr1t3h/3brGEQk2zC0BIWfpZFFQI3/368db18eb3764b08fe0e24005f513881/Security-DarkMode-1_1.png?w=544&amp;q=75 544w, //images.ctfassets.net/wfutmusr1t3h/3brGEQk2zC0BIWfpZFFQI3/368db18eb3764b08fe0e24005f513881/Security-DarkMode-1_1.png?w=768&amp;q=75 768w, //images.ctfassets.net/wfutmusr1t3h/3brGEQk2zC0BIWfpZFFQI3/368db18eb3764b08fe0e24005f513881/Security-DarkMode-1_1.png?w=1012&amp;q=75 1012w, //images.ctfassets.net/wfutmusr1t3h/3brGEQk2zC0BIWfpZFFQI3/368db18eb3764b08fe0e24005f513881/Security-DarkMode-1_1.png?w=1280&amp;q=75 1280w" src="//images.ctfassets.net/wfutmusr1t3h/3brGEQk2zC0BIWfpZFFQI3/368db18eb3764b08fe0e24005f513881/Security-DarkMode-1_1.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>Dynamic application security testing (DAST)</span></h3><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: The thing about Secrets - Why detection is not enough" href="/the-thing-about-secrets-why-detection-is-not-enough/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="//images.ctfassets.net/wfutmusr1t3h/5HOWeairuJfv1Rip9qEC2J/095e5ea6761a247cc615c8c7b13c25de/1200x630-The_Thing_about_secrets_landing_page_hero.png?w=544&amp;q=75 544w, //images.ctfassets.net/wfutmusr1t3h/5HOWeairuJfv1Rip9qEC2J/095e5ea6761a247cc615c8c7b13c25de/1200x630-The_Thing_about_secrets_landing_page_hero.png?w=768&amp;q=75 768w, //images.ctfassets.net/wfutmusr1t3h/5HOWeairuJfv1Rip9qEC2J/095e5ea6761a247cc615c8c7b13c25de/1200x630-The_Thing_about_secrets_landing_page_hero.png?w=1012&amp;q=75 1012w, //images.ctfassets.net/wfutmusr1t3h/5HOWeairuJfv1Rip9qEC2J/095e5ea6761a247cc615c8c7b13c25de/1200x630-The_Thing_about_secrets_landing_page_hero.png?w=1280&amp;q=75 1280w" src="//images.ctfassets.net/wfutmusr1t3h/5HOWeairuJfv1Rip9qEC2J/095e5ea6761a247cc615c8c7b13c25de/1200x630-The_Thing_about_secrets_landing_page_hero.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>The thing about Secrets - Why detection is not enough</span></h3><time class="text-mono mb-3 color-fg-muted">March 22, 2024</time><p class="f3-mktg color-fg-muted">While secrets shouldn’t be in code, they often are... so what&#x27;s next?</p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: Copilot and GitHub Advanced security" href="/webcasts/advanced-security-and-copilot/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="//images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png?w=544&amp;q=75 544w, //images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png?w=768&amp;q=75 768w, //images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png?w=1012&amp;q=75 1012w, //images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png?w=1280&amp;q=75 1280w" src="//images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>Copilot and GitHub Advanced security</span></h3><time class="text-mono mb-3 color-fg-muted">August 10, 2022</time><p class="f3-mktg color-fg-muted">How Copilot and GitHub Advanced security could revolutionize appsec</p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/github-advanced-security/">GitHub Advanced Security</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: Found means fixed with AI-powered application security" href="/webcasts/found-means-fixed-with-ai-powered-application-security/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="//images.ctfassets.net/wfutmusr1t3h/1vs735TqdYuHt9lmfa3PLM/d2641ea12379b185faf7a25ab57091f4/AI_Background_-_Artificial_Intelligence_pillar_-_Light_5_1.webp?w=544&amp;q=75 544w, //images.ctfassets.net/wfutmusr1t3h/1vs735TqdYuHt9lmfa3PLM/d2641ea12379b185faf7a25ab57091f4/AI_Background_-_Artificial_Intelligence_pillar_-_Light_5_1.webp?w=768&amp;q=75 768w, //images.ctfassets.net/wfutmusr1t3h/1vs735TqdYuHt9lmfa3PLM/d2641ea12379b185faf7a25ab57091f4/AI_Background_-_Artificial_Intelligence_pillar_-_Light_5_1.webp?w=1012&amp;q=75 1012w, //images.ctfassets.net/wfutmusr1t3h/1vs735TqdYuHt9lmfa3PLM/d2641ea12379b185faf7a25ab57091f4/AI_Background_-_Artificial_Intelligence_pillar_-_Light_5_1.webp?w=1280&amp;q=75 1280w" src="//images.ctfassets.net/wfutmusr1t3h/1vs735TqdYuHt9lmfa3PLM/d2641ea12379b185faf7a25ab57091f4/AI_Background_-_Artificial_Intelligence_pillar_-_Light_5_1.webp?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>Found means fixed with AI-powered application security</span></h3><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/ai/">AI</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: Found means fixed with AI-powered application security - Americas" href="/webcasts/found-means-fixed-with-ai-powered-application-security-amer/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="//images.ctfassets.net/wfutmusr1t3h/2Kb0VNQ5RFbALb12Q0ZATk/bac048a80cb945e0bb6b0f85c75bd7b6/Landing_page_header_1200x630__3_.png?w=544&amp;q=75 544w, //images.ctfassets.net/wfutmusr1t3h/2Kb0VNQ5RFbALb12Q0ZATk/bac048a80cb945e0bb6b0f85c75bd7b6/Landing_page_header_1200x630__3_.png?w=768&amp;q=75 768w, //images.ctfassets.net/wfutmusr1t3h/2Kb0VNQ5RFbALb12Q0ZATk/bac048a80cb945e0bb6b0f85c75bd7b6/Landing_page_header_1200x630__3_.png?w=1012&amp;q=75 1012w, //images.ctfassets.net/wfutmusr1t3h/2Kb0VNQ5RFbALb12Q0ZATk/bac048a80cb945e0bb6b0f85c75bd7b6/Landing_page_header_1200x630__3_.png?w=1280&amp;q=75 1280w" src="//images.ctfassets.net/wfutmusr1t3h/2Kb0VNQ5RFbALb12Q0ZATk/bac048a80cb945e0bb6b0f85c75bd7b6/Landing_page_header_1200x630__3_.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>Found means fixed with AI-powered application security - Americas</span></h3><time class="text-mono mb-3 color-fg-muted">October 25, 2024</time><p class="f3-mktg color-fg-muted">At GitHub, we believe application security tooling must go beyond alerting—it should also help you fast-track remediation. Enter “Found means fixed,” our vision for AI-powered security. Identifying vulnerabilities is the first step; effectively fixing them is how you’ll make a significant impact.</p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/ai/">AI</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: Found means fixed with AI-powered application security - Asia Pacific" href="/webcasts/found-means-fixed-with-ai-powered-application-security-apac/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="//images.ctfassets.net/wfutmusr1t3h/4Yo12QyqsFVi21vuHzmDAm/50c188600790362f618f370ff76b4ba8/Landing_page_header_1200x630__5_.png?w=544&amp;q=75 544w, //images.ctfassets.net/wfutmusr1t3h/4Yo12QyqsFVi21vuHzmDAm/50c188600790362f618f370ff76b4ba8/Landing_page_header_1200x630__5_.png?w=768&amp;q=75 768w, //images.ctfassets.net/wfutmusr1t3h/4Yo12QyqsFVi21vuHzmDAm/50c188600790362f618f370ff76b4ba8/Landing_page_header_1200x630__5_.png?w=1012&amp;q=75 1012w, //images.ctfassets.net/wfutmusr1t3h/4Yo12QyqsFVi21vuHzmDAm/50c188600790362f618f370ff76b4ba8/Landing_page_header_1200x630__5_.png?w=1280&amp;q=75 1280w" src="//images.ctfassets.net/wfutmusr1t3h/4Yo12QyqsFVi21vuHzmDAm/50c188600790362f618f370ff76b4ba8/Landing_page_header_1200x630__5_.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>Found means fixed with AI-powered application security - Asia Pacific</span></h3><time class="text-mono mb-3 color-fg-muted">October 25, 2024</time><p class="f3-mktg color-fg-muted">At GitHub, we believe application security tooling must go beyond alerting—it should also help you fast-track remediation. Enter “Found means fixed,” our vision for AI-powered security. Identifying vulnerabilities is the first step; effectively fixing them is how you’ll make a significant impact.</p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/ai/">AI</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: Found means fixed with AI-powered application security - Europe, Middle East and Africa" href="/webcasts/found-means-fixed-with-ai-powered-application-security-emea/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="//images.ctfassets.net/wfutmusr1t3h/1hpoegjYYoUcazuzFesvok/172185e12fdb2e262e6fc07ac5006c45/Landing_page_header_1200x630__4_.png?w=544&amp;q=75 544w, //images.ctfassets.net/wfutmusr1t3h/1hpoegjYYoUcazuzFesvok/172185e12fdb2e262e6fc07ac5006c45/Landing_page_header_1200x630__4_.png?w=768&amp;q=75 768w, //images.ctfassets.net/wfutmusr1t3h/1hpoegjYYoUcazuzFesvok/172185e12fdb2e262e6fc07ac5006c45/Landing_page_header_1200x630__4_.png?w=1012&amp;q=75 1012w, //images.ctfassets.net/wfutmusr1t3h/1hpoegjYYoUcazuzFesvok/172185e12fdb2e262e6fc07ac5006c45/Landing_page_header_1200x630__4_.png?w=1280&amp;q=75 1280w" src="//images.ctfassets.net/wfutmusr1t3h/1hpoegjYYoUcazuzFesvok/172185e12fdb2e262e6fc07ac5006c45/Landing_page_header_1200x630__4_.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>Found means fixed with AI-powered application security - Europe, Middle East and Africa</span></h3><time class="text-mono mb-3 color-fg-muted">October 25, 2024</time><p class="f3-mktg color-fg-muted">At GitHub, we believe application security tooling must go beyond alerting—it should also help you fast-track remediation. Enter “Found means fixed,” our vision for AI-powered security. Identifying vulnerabilities is the first step; effectively fixing them is how you’ll make a significant impact.</p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/ai/">AI</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: Meet GitHub Advanced Security" href="/webcasts/github-at-black-hat/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="//images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png?w=544&amp;q=75 544w, //images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png?w=768&amp;q=75 768w, //images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png?w=1012&amp;q=75 1012w, //images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png?w=1280&amp;q=75 1280w" src="//images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>Meet GitHub Advanced Security</span></h3><time class="text-mono mb-3 color-fg-muted">August 10, 2022</time><p class="f3-mktg color-fg-muted">We recently participated in Black Hat USA, a cybersecurity conference in Las Vegas, where we shared our developer-empowering solutions that can help organizations secure their code in minutes. Sign up below to watch the session</p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/github-advanced-security/">GitHub Advanced Security</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: GitHub Roadmap Webinar, Q2" href="/webcasts/github-roadmap-webinar-q2-gated/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="//images.ctfassets.net/wfutmusr1t3h/2D5ge3LyZ9XKcThUCHn0Tq/5bd898e3ab0f68b46f695d46eb56ab6a/1200x630.png?w=544&amp;q=75 544w, //images.ctfassets.net/wfutmusr1t3h/2D5ge3LyZ9XKcThUCHn0Tq/5bd898e3ab0f68b46f695d46eb56ab6a/1200x630.png?w=768&amp;q=75 768w, //images.ctfassets.net/wfutmusr1t3h/2D5ge3LyZ9XKcThUCHn0Tq/5bd898e3ab0f68b46f695d46eb56ab6a/1200x630.png?w=1012&amp;q=75 1012w, //images.ctfassets.net/wfutmusr1t3h/2D5ge3LyZ9XKcThUCHn0Tq/5bd898e3ab0f68b46f695d46eb56ab6a/1200x630.png?w=1280&amp;q=75 1280w" src="//images.ctfassets.net/wfutmusr1t3h/2D5ge3LyZ9XKcThUCHn0Tq/5bd898e3ab0f68b46f695d46eb56ab6a/1200x630.png?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>GitHub Roadmap Webinar, Q2</span></h3><time class="text-mono mb-3 color-fg-muted">April 3, 2024</time><p class="f3-mktg color-fg-muted">Where’s GitHub headed next? Join us for our Roadmap Webinar to find out. </p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/ai/">AI</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/enterprise/">Enterprise</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: GitHub Roadmap Webinar, Q3" href="/webcasts/github-roadmap-webinar-q3/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="//images.ctfassets.net/wfutmusr1t3h/2M7bEkJclYD5k452zQuZNB/f7d57b394b6b7f6cd75c064f9a65a0b5/352655658-7823c2f9-2165-4542-8497-e9902aabe6a9.webp?w=544&amp;q=75 544w, //images.ctfassets.net/wfutmusr1t3h/2M7bEkJclYD5k452zQuZNB/f7d57b394b6b7f6cd75c064f9a65a0b5/352655658-7823c2f9-2165-4542-8497-e9902aabe6a9.webp?w=768&amp;q=75 768w, //images.ctfassets.net/wfutmusr1t3h/2M7bEkJclYD5k452zQuZNB/f7d57b394b6b7f6cd75c064f9a65a0b5/352655658-7823c2f9-2165-4542-8497-e9902aabe6a9.webp?w=1012&amp;q=75 1012w, //images.ctfassets.net/wfutmusr1t3h/2M7bEkJclYD5k452zQuZNB/f7d57b394b6b7f6cd75c064f9a65a0b5/352655658-7823c2f9-2165-4542-8497-e9902aabe6a9.webp?w=1280&amp;q=75 1280w" src="//images.ctfassets.net/wfutmusr1t3h/2M7bEkJclYD5k452zQuZNB/f7d57b394b6b7f6cd75c064f9a65a0b5/352655658-7823c2f9-2165-4542-8497-e9902aabe6a9.webp?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>GitHub Roadmap Webinar, Q3</span></h3><time class="text-mono mb-3 color-fg-muted">March 7, 2024</time><p class="f3-mktg color-fg-muted">Curious about GitHub&#x27;s 2024 Q3 releases? Watch to learn more.</p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/ai/">AI</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/developer-productivity/">Developer Productivity</a></div></div><div class="resource-card animatable animate-fade-up " data-testid="page-thumbnail"><a class="resource-card-overlay-link" aria-label="Go to page: Securing your Azure DevOps workflow with GitHub Advanced Security" href="/webcasts/securing-your-azure-devops-workflow-with-github-advanced-security/"></a><span style="box-sizing:border-box;display:block;overflow:hidden;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;position:relative"><span style="box-sizing:border-box;display:block;width:initial;height:initial;background:none;opacity:1;border:0;margin:0;padding:0;padding-top:52.5%"></span><img alt="" src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" decoding="async" data-nimg="responsive" class="resource-card-image" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover"/><noscript><img alt="" loading="lazy" decoding="async" data-nimg="responsive" style="position:absolute;top:0;left:0;bottom:0;right:0;box-sizing:border-box;padding:0;border:none;margin:auto;display:block;width:0;height:0;min-width:100%;max-width:100%;min-height:100%;max-height:100%;object-fit:cover" class="resource-card-image" sizes="100vw" srcSet="//images.ctfassets.net/wfutmusr1t3h/43L6FaIKqL549vmQSHpTYe/78a9ac0a73a287bbe7a4772ec9723377/Securing_your_Azure_DevOps_workflow_with_GitHub_Advanced_Security.jpg?w=544&amp;q=75 544w, //images.ctfassets.net/wfutmusr1t3h/43L6FaIKqL549vmQSHpTYe/78a9ac0a73a287bbe7a4772ec9723377/Securing_your_Azure_DevOps_workflow_with_GitHub_Advanced_Security.jpg?w=768&amp;q=75 768w, //images.ctfassets.net/wfutmusr1t3h/43L6FaIKqL549vmQSHpTYe/78a9ac0a73a287bbe7a4772ec9723377/Securing_your_Azure_DevOps_workflow_with_GitHub_Advanced_Security.jpg?w=1012&amp;q=75 1012w, //images.ctfassets.net/wfutmusr1t3h/43L6FaIKqL549vmQSHpTYe/78a9ac0a73a287bbe7a4772ec9723377/Securing_your_Azure_DevOps_workflow_with_GitHub_Advanced_Security.jpg?w=1280&amp;q=75 1280w" src="//images.ctfassets.net/wfutmusr1t3h/43L6FaIKqL549vmQSHpTYe/78a9ac0a73a287bbe7a4772ec9723377/Securing_your_Azure_DevOps_workflow_with_GitHub_Advanced_Security.jpg?w=1280&amp;q=75"/></noscript></span><h3 class="h4-mktg font-weight-semibold heading"><span>Securing your Azure DevOps workflow with GitHub Advanced Security</span></h3><time class="text-mono mb-3 color-fg-muted">September 4, 2023</time><p class="f3-mktg color-fg-muted">In today&#x27;s fast-paced development landscape, keeping your code secure shouldn&#x27;t slow you down. That&#x27;s why we&#x27;re thrilled to introduce GitHub Advanced Security on Azure DevOps. </p><div class="text-mono f5 mt-4"><a class="Link--primary no-underline resource-card-tag" href="/topics/security/">Security</a>, <a class="Link--primary no-underline resource-card-tag" href="/topics/github-advanced-security/">GitHub Advanced Security</a></div></div></div></div></div></div></section></main></div></div><script id="__NEXT_DATA__" type="application/json">{"props":{"pageProps":{"topic":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}},"pages":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5Em2r2EFmNclm9rACMkTsE","type":"Entry","createdAt":"2024-01-11T21:02:28.499Z","updatedAt":"2024-02-21T16:26:10.429Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/appsec-talk","seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"31ykrAuEINb48VIIxOFTTs","type":"Entry","createdAt":"2022-09-13T18:42:56.296Z","updatedAt":"2024-10-03T13:01:33.127Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{"metaDescription":"This highly interactive, three-part learning journey will highlight some of the shortcomings of legacy application security solutions, and share our end-to-end solution that will empower and enable developers to ship more secure software","metaImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1Rmx4gf6cyr32UHH1geg8a","type":"Asset","createdAt":"2022-09-13T18:41:45.515Z","updatedAt":"2022-09-13T18:41:45.515Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"learning-journey-code-security-2022","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/1Rmx4gf6cyr32UHH1geg8a/55aa4ee32880d187925d0fa03be1ba59/1200x630-Landing_page_banner.png","details":{"size":676781,"image":{"width":1200,"height":627}},"fileName":"1200x630-Landing page banner.png","contentType":"image/png"}}}}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5kHvJOY2qT473Up2IEy1iH","type":"Entry","createdAt":"2024-09-26T23:52:33.056Z","updatedAt":"2024-09-26T23:52:33.056Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/artificial-intelligence/gartner-ai-will-not-replace-software-engineers","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6O0tViAHLppTygEY6baHnV","type":"Entry","createdAt":"2024-09-26T23:49:31.806Z","updatedAt":"2024-11-26T11:02:06.249Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":88,"revision":34,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"Resource Page for /artificial-intelligence/gartner-ai-will-not-replace-software-engineers","title":"AI Will Not Replace Software Engineers (and May, in Fact, Require More)","description":"Explore the current and future impact of AI on developers and see why humans will always be essential to delivering innovative software in this report. ","body":"Explore the current and future impact of AI on developers—and find out why humans will always be essential to delivering innovative software. \n\nRead the Gartner® report, AI Will Not Replace Software Engineers (and May, in Fact, Require More), to:\n\n- See how AI will transform the role of engineering teams today, tomorrow, and well into the future.\n- Get recommendations—backed by research—about how to prepare for the emergence of AI engineering.\n- Learn how the use of AI-powered tools will create distinct career paths for junior and senior developers.\n\nGartner, AI Will Not Replace Software Engineers (and May, in Fact, Require More), Philip Walsh, Gunjan Gupta, Helen Poitevin, Keith Mann, Dave Micko, Manjunath Bhat, 30 August 2024. \n\n---\n\n*GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.*\n\n*Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. *","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"39K111Ykeo75XNzg6GxWnU","type":"Entry","createdAt":"2024-09-26T23:49:27.340Z","updatedAt":"2024-09-26T23:49:27.340Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"article"}},"locale":"en-US"},"fields":{}},"gated":true,"sfCampaignID":"7015c000001insbAAA","campaign":"2025q1-msft-gdc-buyer-gartner-ai-will-not-replace-landing-page","contentForm":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"29pgfqCfdxdlIwCbnjfyCk","type":"Entry","createdAt":"2022-08-12T18:32:47.415Z","updatedAt":"2024-11-26T11:29:50.030Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":157,"revision":70,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"form"}},"locale":"en-US"},"fields":{"name":"Generic gated article form","title":"Read the report","subtitle":"Tell us a bit about you.","eloquaFormName":"ContentReg_TemplateForm","formCTA":"Download PDF","formElements":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6FMPEpNvfZnVg5o5pNdmAz","type":"Entry","createdAt":"2023-04-04T12:27:23.053Z","updatedAt":"2024-11-26T11:37:14.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":373,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"First name","htmlName":"firstName","type":"text","placeholder":"First name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Euizanl72D7hjUPBu1cz4","type":"Entry","createdAt":"2023-04-04T12:27:44.815Z","updatedAt":"2024-11-26T11:37:30.225Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":372,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Last name","htmlName":"lastName","type":"text","placeholder":"Last name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1oc1nNacqE77XQSuJXaNdl","type":"Entry","createdAt":"2022-03-12T20:17:06.911Z","updatedAt":"2024-11-26T11:37:42.078Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":281,"revision":138,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Work Email Address","htmlName":"emailAddress","type":"email","placeholder":"you@example.com","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"40sP3SIDeLJIKo7gAvmAdv","type":"Entry","createdAt":"2022-03-12T20:30:16.766Z","updatedAt":"2024-11-26T11:37:50.340Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":264,"revision":130,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Job Title","htmlName":"title","type":"text","placeholder":"Job Title","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5HOQnFx9120Wj4hlsjXaJn","type":"Entry","createdAt":"2022-03-12T20:19:03.843Z","updatedAt":"2024-11-26T11:37:58.388Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":374,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Company","htmlName":"company","type":"text","placeholder":"Acme, Inc","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6shzXkav3X5xzvnIRMCf5E","type":"Entry","createdAt":"2022-03-30T19:00:54.871Z","updatedAt":"2024-11-26T11:38:07.076Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":202,"revision":95,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Country","htmlName":"country2","type":"dropdown","placeholder":"Select country","required":true,"dropdownAsJson":[{"label":"Select Country","value":""},{"label":"Albania","value":"AL"},{"label":"Åland Islands","value":"AX"},{"label":"Algeria","value":"DZ"},{"label":"American Samoa","value":"AS"},{"label":"Andorra","value":"AD"},{"label":"Angola","value":"AO"},{"label":"Anguilla","value":"AI"},{"label":"Antarctica","value":"AQ"},{"label":"Antigua and Barbuda","value":"AG"},{"label":"Argentina","value":"AR"},{"label":"Armenia","value":"AM"},{"label":"Aruba","value":"AW"},{"label":"Australia","value":"AU"},{"label":"Austria","value":"AT"},{"label":"Azerbaijan","value":"AZ"},{"label":"Bahamas (the)","value":"BS"},{"label":"Bahrain","value":"BH"},{"label":"Bangladesh","value":"BD"},{"label":"Barbados","value":"BB"},{"label":"Belarus","value":"BY"},{"label":"Belgium","value":"BE"},{"label":"Belize","value":"BZ"},{"label":"Benin","value":"BJ"},{"label":"Bermuda","value":"BM"},{"label":"Bhutan","value":"BT"},{"label":"Bolivia (Plurinational State of)","value":"BO"},{"label":"Bonaire, Sint Eustatius and Saba","value":"BQ"},{"label":"Bosnia and Herzegovina","value":"BA"},{"label":"Botswana","value":"BW"},{"label":"Bouvet Island","value":"BV"},{"label":"Brazil","value":"BR"},{"label":"British Indian Ocean Territory (the)","value":"IO"},{"label":"Brunei Darussalam","value":"BN"},{"label":"Bulgaria","value":"BG"},{"label":"Burkina Faso","value":"BF"},{"label":"Burundi","value":"BI"},{"label":"Cabo Verde","value":"CV"},{"label":"Cambodia","value":"KH"},{"label":"Cameroon","value":"CM"},{"label":"Canada","value":"CA"},{"label":"Cayman Islands (the)","value":"KY"},{"label":"Central African Republic (the)","value":"CF"},{"label":"Chad","value":"TD"},{"label":"Chile","value":"CL"},{"label":"China","value":"CN"},{"label":"Christmas Island","value":"CX"},{"label":"Cocos (Keeling) Islands (the)","value":"CC"},{"label":"Colombia","value":"CO"},{"label":"Comoros (the)","value":"KM"},{"label":"Congo (the Democratic Republic of the)","value":"CD"},{"label":"Congo (the)","value":"CG"},{"label":"Cook Islands (the)","value":"CK"},{"label":"Costa Rica","value":"CR"},{"label":"Croatia","value":"HR"},{"label":"Cuba","value":"CU"},{"label":"Curaçao","value":"CW"},{"label":"Cyprus","value":"CY"},{"label":"Czechia","value":"CZ"},{"label":"Côte d'Ivoire","value":"CI"},{"label":"Denmark","value":"DK"},{"label":"Djibouti","value":"DJ"},{"label":"Dominica","value":"DM"},{"label":"Dominican Republic (the)","value":"DO"},{"label":"Ecuador","value":"EC"},{"label":"Egypt","value":"EG"},{"label":"El Salvador","value":"SV"},{"label":"Equatorial Guinea","value":"GQ"},{"label":"Eritrea","value":"ER"},{"label":"Estonia","value":"EE"},{"label":"Eswatini","value":"SZ"},{"label":"Ethiopia","value":"ET"},{"label":"Falkland Islands (the) [Malvinas]","value":"FK"},{"label":"Faroe Islands (the)","value":"FO"},{"label":"Fiji","value":"FJ"},{"label":"Finland","value":"FI"},{"label":"France","value":"FR"},{"label":"French Guiana","value":"GF"},{"label":"French Polynesia","value":"PF"},{"label":"French Southern Territories (the)","value":"TF"},{"label":"Gabon","value":"GA"},{"label":"Gambia (the)","value":"GM"},{"label":"Georgia","value":"GE"},{"label":"Germany","value":"DE"},{"label":"Ghana","value":"GH"},{"label":"Gibraltar","value":"GI"},{"label":"Greece","value":"GR"},{"label":"Greenland","value":"GL"},{"label":"Grenada","value":"GD"},{"label":"Guadeloupe","value":"GP"},{"label":"Guam","value":"GU"},{"label":"Guatemala","value":"GT"},{"label":"Guernsey","value":"GG"},{"label":"Guinea","value":"GN"},{"label":"Guinea-Bissau","value":"GW"},{"label":"Guyana","value":"GY"},{"label":"Haiti","value":"HT"},{"label":"Heard Island and McDonald Islands","value":"HM"},{"label":"Holy See (the)","value":"VA"},{"label":"Honduras","value":"HN"},{"label":"Hong Kong","value":"HK"},{"label":"Hungary","value":"HU"},{"label":"Iceland","value":"IS"},{"label":"India","value":"IN"},{"label":"Indonesia","value":"ID"},{"label":"Iran (Islamic Republic of)","value":"IR"},{"label":"Iraq","value":"IQ"},{"label":"Ireland","value":"IE"},{"label":"Isle of Man","value":"IM"},{"label":"Israel","value":"IL"},{"label":"Italy","value":"IT"},{"label":"Jamaica","value":"JM"},{"label":"Japan","value":"JP"},{"label":"Jersey","value":"JE"},{"label":"Jordan","value":"JO"},{"label":"Kazakhstan","value":"KZ"},{"label":"Kenya","value":"KE"},{"label":"Kiribati","value":"KI"},{"label":"Korea (the Democratic People's Republic of)","value":"KP"},{"label":"Korea (the Republic of)","value":"KR"},{"label":"Kuwait","value":"KW"},{"label":"Kyrgyzstan","value":"KG"},{"label":"Lao People's Democratic Republic (the)","value":"LA"},{"label":"Latvia","value":"LV"},{"label":"Lebanon","value":"LB"},{"label":"Lesotho","value":"LS"},{"label":"Liberia","value":"LR"},{"label":"Libya","value":"LY"},{"label":"Liechtenstein","value":"LI"},{"label":"Lithuania","value":"LT"},{"label":"Luxembourg","value":"LU"},{"label":"Macao","value":"MO"},{"label":"Madagascar","value":"MG"},{"label":"Malawi","value":"MW"},{"label":"Malaysia","value":"MY"},{"label":"Maldives","value":"MV"},{"label":"Mali","value":"ML"},{"label":"Malta","value":"MT"},{"label":"Marshall Islands (the)","value":"MH"},{"label":"Martinique","value":"MQ"},{"label":"Mauritania","value":"MR"},{"label":"Mauritius","value":"MU"},{"label":"Mayotte","value":"YT"},{"label":"Mexico","value":"MX"},{"label":"Micronesia (Federated States of)","value":"FM"},{"label":"Moldova (the Republic of)","value":"MD"},{"label":"Monaco","value":"MC"},{"label":"Mongolia","value":"MN"},{"label":"Montenegro","value":"ME"},{"label":"Montserrat","value":"MS"},{"label":"Morocco","value":"MA"},{"label":"Mozambique","value":"MZ"},{"label":"Myanmar","value":"MM"},{"label":"Namibia","value":"NA"},{"label":"Nauru","value":"NR"},{"label":"Nepal","value":"NP"},{"label":"Netherlands (the)","value":"NL"},{"label":"New Caledonia","value":"NC"},{"label":"New Zealand","value":"NZ"},{"label":"Nicaragua","value":"NI"},{"label":"Niger (the)","value":"NE"},{"label":"Nigeria","value":"NG"},{"label":"Niue","value":"NU"},{"label":"Norfolk Island","value":"NF"},{"label":"Northern Mariana Islands (the)","value":"MP"},{"label":"Norway","value":"NO"},{"label":"Oman","value":"OM"},{"label":"Pakistan","value":"PK"},{"label":"Palau","value":"PW"},{"label":"Palestine, State of","value":"PS"},{"label":"Panama","value":"PA"},{"label":"Papua New Guinea","value":"PG"},{"label":"Paraguay","value":"PY"},{"label":"Peru","value":"PE"},{"label":"Philippines (the)","value":"PH"},{"label":"Pitcairn","value":"PN"},{"label":"Poland","value":"PL"},{"label":"Portugal","value":"PT"},{"label":"Puerto Rico","value":"PR"},{"label":"Qatar","value":"QA"},{"label":"Republic of North Macedonia","value":"MK"},{"label":"Romania","value":"RO"},{"label":"Russian Federation (the)","value":"RU"},{"label":"Rwanda","value":"RW"},{"label":"Réunion","value":"RE"},{"label":"Saint Barthélemy","value":"BL"},{"label":"Saint Helena, Ascension and Tristan da Cunha","value":"SH"},{"label":"Saint Kitts and Nevis","value":"KN"},{"label":"Saint Lucia","value":"LC"},{"label":"Saint Martin (French part)","value":"MF"},{"label":"Saint Pierre and Miquelon","value":"PM"},{"label":"Saint Vincent and the Grenadines","value":"VC"},{"label":"Samoa","value":"WS"},{"label":"San Marino","value":"SM"},{"label":"Sao Tome and Principe","value":"ST"},{"label":"Saudi Arabia","value":"SA"},{"label":"Senegal","value":"SN"},{"label":"Serbia","value":"RS"},{"label":"Seychelles","value":"SC"},{"label":"Sierra Leone","value":"SL"},{"label":"Singapore","value":"SG"},{"label":"Sint Maarten (Dutch part)","value":"SX"},{"label":"Slovakia","value":"SK"},{"label":"Slovenia","value":"SI"},{"label":"Solomon Islands","value":"SB"},{"label":"Somalia","value":"SO"},{"label":"South Africa","value":"ZA"},{"label":"South Georgia and the South Sandwich Islands","value":"GS"},{"label":"South Sudan","value":"SS"},{"label":"Spain","value":"ES"},{"label":"Sri Lanka","value":"LK"},{"label":"Sudan (the)","value":"SD"},{"label":"Surilabel","value":"SR"},{"label":"Svalbard and Jan Mayen","value":"SJ"},{"label":"Sweden","value":"SE"},{"label":"Switzerland","value":"CH"},{"label":"Syrian Arab Republic","value":"SY"},{"label":"Taiwan","value":"TW"},{"label":"Tajikistan","value":"TJ"},{"label":"Tanzania, United Republic of","value":"TZ"},{"label":"Thailand","value":"TH"},{"label":"Timor-Leste","value":"TL"},{"label":"Togo","value":"TG"},{"label":"Tokelau","value":"TK"},{"label":"Tonga","value":"TO"},{"label":"Trinidad and Tobago","value":"TT"},{"label":"Tunisia","value":"TN"},{"label":"Turkey","value":"TR"},{"label":"Turkmenistan","value":"TM"},{"label":"Turks and Caicos Islands (the)","value":"TC"},{"label":"Tuvalu","value":"TV"},{"label":"Uganda","value":"UG"},{"label":"Ukraine","value":"UA"},{"label":"United Arab Emirates (the)","value":"AE"},{"label":"United Kingdom of Great Britain and Northern Ireland (the)","value":"GB"},{"label":"United States Minor Outlying Islands (the)","value":"UM"},{"label":"United States of America (the)","value":"US"},{"label":"Uruguay","value":"UY"},{"label":"Uzbekistan","value":"UZ"},{"label":"Vanuatu","value":"VU"},{"label":"Venezuela (Bolivarian Republic of)","value":"VE"},{"label":"Viet Nam","value":"VN"},{"label":"Virgin Islands (British)","value":"VG"},{"label":"Virgin Islands (U.S.)","value":"VI"},{"label":"Wallis and Futuna","value":"WF"},{"label":"Western Sahara","value":"EH"},{"label":"Yemen","value":"YE"},{"label":"Zambia","value":"ZM"},{"label":"Zimbabwe","value":"ZW"}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3h8RLi98FBWNpCNOaFk0wY","type":"Entry","createdAt":"2022-03-30T18:37:38.562Z","updatedAt":"2024-11-26T11:38:15.004Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":188,"revision":90,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Phone","htmlName":"phone","type":"tel","placeholder":"12 3456 7890","required":false}}]}},"extraFormFields":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6z2cGa4cuvoWqGxS3Ejhv4","type":"Entry","createdAt":"2023-09-12T16:31:47.760Z","updatedAt":"2024-11-26T11:32:18.468Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":127,"revision":59,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"sFDCLastCampaignStatus","htmlName":"sFDCLastCampaignStatus","type":"hidden","required":false,"defaultValue":"Responded"}}],"buttonCTA":"Get the report","publicationDate":"2024-09-26T00:00","hidden":false,"rendersRichText":false,"marketoCampaign":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5jLo1PGMxIjbStz5zArpex","type":"Entry","createdAt":"2024-09-26T23:49:09.865Z","updatedAt":"2024-09-26T23:49:09.865Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"marketoCampaign"}},"locale":"en-US"},"fields":{"title":"CO-GHAI-CNTNT-FY25-09Sep-18-Gartner-AI-Will-Not-Replace-Software-Engineers","cDLProgramName":"454105","source":"Content","active":true}},"redirectUrl":"https://resources.github.com/artificial-intelligence/gartner-ai-will-not-replace-software-engineers/thank-you"}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1S6weHTSpC4Grk6tRLsMSf","type":"Entry","createdAt":"2024-09-26T23:52:29.429Z","updatedAt":"2024-11-26T11:10:04.014Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":74,"revision":36,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{"metaTitle":"AI Will Not Replace Software Engineers (and May, in Fact, Require More) – Analyst Report","metaDescription":"Explore the current and future impact of AI on developers and see why humans will always be essential to delivering innovative software in this report. "}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5R9zfL5sHOvIqOX4WnG1mJ","type":"Entry","createdAt":"2024-01-11T21:00:30.758Z","updatedAt":"2024-11-26T10:53:17.315Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":85,"revision":44,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"github-advanced-security","label":"GitHub Advanced Security"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2rym8Y8A56ngjMrr6oSlmh","type":"Entry","createdAt":"2024-01-11T21:00:35.775Z","updatedAt":"2024-11-26T10:53:25.505Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":194,"revision":98,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"devops","label":"DevOps"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"71WdkjJ6G85UeMIb733kZH","type":"Entry","createdAt":"2024-01-11T21:00:22.630Z","updatedAt":"2024-11-26T10:53:33.812Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":75,"revision":38,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"integrations","label":"Integrations"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7wXHiRnPRdKceDxtr3CQRj","type":"Entry","createdAt":"2024-01-11T21:00:26.704Z","updatedAt":"2024-11-26T10:53:41.980Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":119,"revision":60,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"github-actions","label":"GitHub Actions"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4tRIEckIxlhGssufOSHkgs","type":"Entry","createdAt":"2023-08-24T13:16:23.332Z","updatedAt":"2024-03-01T01:04:32.489Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":4,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/devops/fundamentals/devsecops","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Jh5Bn2YP6ii5cByzAvrO1","type":"Entry","createdAt":"2024-03-01T01:04:32.574Z","updatedAt":"2024-10-17T17:50:45.884Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":72,"revision":22,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"Resource Page for /devops/fundamentals/devsecops","title":"DevSecOps explained","description":"DevSecOps builds on the ideas of DevOps by applying security practices throughout the software development lifecycle to ship more secure code faster.","body":"*Through collaboration, automation, and continuous improvement, DevSecOps offers a set of practices that help companies embed security into their work to build more secure, high-quality software at scale.*\n\nDevOps has transformed how many organizations build and ship software. But until recently one aspect of the software development lifecycle (SDLC) has remained outside DevOps: security. DevSecOps seeks to correct that by baking security into the software development lifecycle (SDLC) in the same way that DevOps prioritizes quality, speed, and deep collaboration throughout all stages of software development. For modern organizations, DevSecOps becomes just “DevOps”: security is baked into the SDLC experience.\n\nOrganizations that adopt DevSecOps typically see advantages that include:\n\n- **Reduced risk of data breaches:** \nDevSecOps seeks to make code secure by design. A combination of secure coding cultural practices, secure developer environments, and automated security tests throughout the SDLC help reduce the chances of security vulnerabilities or flaws making it into production software.\n\n- **Improved compliance:** \nDevSecOps practitioners often use automation to enforce code compliance and integrate policy enforcement tooling directly into the CI/CD pipeline.\n\n- **Greater confidence in dependencies:** \nThe modern technology stack depends heavily on third-party code, often from public package repositories. DevSecOps practitioners frequently leverage tooling and automated tests to identify potential issues before a software release.\n\n- **Value gets to end users faster:** \nBy creating a security-first culture and applying automated checks, DevSecOps reduces the need for distinct security reviews that slow down code deployments.\n\n## What is the main benefit of DevSecOps?\n\nDevSecOps seeks to build security into every step of the SDLC. This ideally means that security related tests (automated and not) take place at each stage from coding to merging branches to builds, deployments, and on into operation of production software. Moreover, DevSecOps advances the idea that everyone working on a product is accountable for its security. This helps teams catch vulnerabilities before they make it to production and reduces the need for late-stage, manual security reviews, which can slow down software releases.\n\n## DevSecOps best practices\n\nPush buggy code into production and the result might be a bad customer experience and potential lost business due to downtime. But if you deploy insecure code, the fallout can be far more severe.\n\nDevSecOps is a natural evolution of DevOps and seeks to make security a core part of the SDLC instead of a siloed process that takes place right before a release. Just like how testing and operations teams were often siloed from development in the pre-DevOps world, security today is often the job of specialized teams whose work take place outside the DevOps lifecycle. \n\nDevSecOps argues that security needs to be embedded across the SDLC. Whether your organization already practices DevOps or you’re looking at how to adopt a DevOps culture, here are the foundational best practices you need to establish a DevSecOps practice:\n\n- **Create a DevSecOps culture:** Success in DevSecOps relies on _everyone_ taking responsibility for security. That means each person in the SDLC codes, builds, tests, and configures application and infrastructure settings defensively. Just like DevOps, DevSecOps thrives in an open culture where each individual works together to build the best and most secure product possible.\n\n- **Design security into the product:** DevSecOps seeks to design security into products from the initial planning stages to deployed production-level code. This means security work is planned alongside feature work, and practitioners are provided security knowledge and testing throughout each stage of their development work. The goal is to make security an everyday part of your team’s work.\n\n- **Build a threat modeling practice:** The seeds of security vulnerabilities are often sown before a line of code is written. Model potential threats during the planning phase and design your infrastructure and the application’s architecture to mitigate those issues. And periodic penetration testing, where a trusted person attempts to break into your system, can help unveil weaknesses you may miss in your threat models.\n\n- **Automate for speed and security:** Automated testing is used throughout the SDLC to ensure the right security checks happen at the right time. That gives people more time to focus on building the core product while ensuring security requirements are met.\n\n- **Plan security checkpoints in your product development:** \nIdentify transition points in your SDLC where the risk profile changes. That could be the point at which a developer merges their code into the main branch, which might increase the potential for that code to be run on the machines of colleagues and eventually reach production. In that case, opening a pull request might be a good trigger event for automated security checks, along with the appropriate manual escalations.\n\n- **Approach security failures as learning opportunities:** \nBuilding on DevOps’ culture of continuous improvement, a successful DevSecOps practice strives to turn security incidents into learning opportunities. This can be accomplished by leveraging audit logs, building incident reports, and modeling malicious behavior to improve tooling, testing, and processes to further secure your applications and systems. \n\n- **Stay on top of dependencies:** \nUnderstanding and mitigating the potential threats from dependencies is critical to your product’s security. Apply the same threat modeling and automated testing to your dependencies as to your in-house code. At GitHub we’ve [identified and shared details of tens of millions of threats in open source software][1], helping organizations and developers be more aware of and avoid vulnerabilities. \n\n- **Build your analytics and reporting capabilities:** \nContinuous monitoring is a critical part of a DevSecOps practice—and that includes real-time alerts, system analytics, and proactive threat monitoring. By measuring every aspect of your application and your DevSecOps pipeline you can create a common point for understanding application health. Reporting dashboards and alerts highlight problems early. When a problem does occur, the telemetry you’ve set up—such as application-level logging—provides insight for incident resolution and root cause analysis.\n\n## DevSecOps culture\n\nCreating a DevSecOps culture begins by making security everyone’s responsibility. This can be a big change for many organizations. Traditionally, security was something developers left in the hands of specialist security professionals. It could also become a point of friction as well. Engineering teams often looked at security practices as an impediment to shipping software fast.\n\nDevSecOps fundamentally seeks to change this perception by making security as core to the SDLC as writing code, running tests, configuring services. Each new feature or fix begins with considering its security implications. Security and compliance policies are enforced through tests. When something goes wrong, it’s an opportunity to learn and to do it better next time.\n\nAnd instead of something that slows down software releases, security in a DevSecOps practice becomes a part of the release itself leading to faster and more secure deployments.\n\nBut building a successful DevSecOps practice requires building security into every stage of the SDLC. This varies from one organization to another. Even so, there are core pillars that define a DevSecOps culture. These include: \n\n- **People:** \nA DevSecOps practice seeks to remove the barriers between different disciplines and build a naturally collaborative environment where each person shares responsibility for a product’s security and quality.\n\n- **Process:** \nDevSecOps moves security from being a distinct stage that often comes at the end of the SDLC to an integral part of each person’s work. Automated security evaluations, security-focused unit testing, widespread monitoring, and defensive coding create rapid feedback loops where vulnerabilities are surfaced earlier in the product life cycle and can be fixed faster.\n\n- **Products:** \nDevSecOps builds on the DevOps toolchain by using technologies such as CI/CD to automate the identification of security issues. Dependency scanning, static and dynamic application security testing, and automated policy enforcement tools are often used to help build security into every stage of the SDLC. A wide range of best-in-breed solutions can be integrated with one another to create an “open” toolchain. Other organizations, however, may find that more integrated and security-focused product suites can often provide a more holistic experience.\n\n- **Governance:** \nContinuous improvement is central to DevSecOps and it requires creating a culture of measurement that enables practitioners to identify opportunities to refine processes and tooling.\n\n## DevSecOps pipeline\n\nA DevSecOps culture seeks to establish security as a fundamental part of creating software—but that’s only one part of what it takes to successfully adopt a DevSecOps practice. The next step is to integrate security into each stage of a [DevOps pipeline][2].\n\nWith security specific tooling and processes throughout the SDLC, a DevSecOps pipeline helps practitioners design more secure products and catch security issues early in the product life cycle. \n\n![DevOps Pipeline Infinity][3]\n\n### Common DevSecOps pipeline stages\n\nDevSecOps builds on DevOps, and a DevSecOps pipeline builds on a DevOps pipeline. Just as DevOps integrated quality and speed into each step, the best DevSecOps pipelines are designed to anticipate key points in the SDLC where security issues are likely to arise.\n\nThis breaks down into the following common DevSecOps pipeline stages: \n\n- **Plan:** \nIn a DevSecOps practice, security starts at the planning stage in the SDLC pipeline. This can include analyzing potential security threats and determining how to combat them with threat modeling. It can also involve designing security into your products proactively to ensure it’s baked into the work from the beginning with key data hygiene and other security decisions taken up front. \n\n- **Code:** \nAt the coding stage in a DevSecOps pipeline, it’s important to create a culture of defensive programming with policies that help practitioners proactively navigate security and compliance issues. This could be as simple as specifying rules for how to handle particularly risky aspects of code, such as NULLs, or involve broader guidelines on areas such as input validation. \n\n- **Build:** \nIn the build stage, a typical DevSecOps pipeline will include automated security checks to catch vulnerabilities in source code before they hit the main branch. This can involve using pre-commit hooks to run static application security testing (SAST) tools where any potential issues in code will stop the build, much like a failed test, and provide time to fix any potential vulnerabilities in proprietary source code before work can progress. It should also include software composition analysis (SCA) tools to track open source components in the codebase and detect any vulnerabilities in dependencies. \n\n- **Test:** \nThe test stage of a DevSecOps pipeline is a key point where practitioners will develop a testing strategy and automated testing suite to catch any potential security vulnerabilities or issues. This commonly includes using unit tests at a base level to look for security issues such as the way in which the application deals with unexpected or malformed input. It can also include dynamic application security tests to find vulnerabilities in the application when run. This way, the test phase becomes as much as security as it does functionality. A good tip at this stage is to integrate dynamic application security testing (DAST) into the DevSecOps pipeline.\n\n- **Release:** \nIn the release stage, a DevSecOps pipeline will often include additional automated security testing and vulnerability scanning to catch issues that might not have been apparent in earlier stages. Some organizations will also deploy the principle of least privilege where each person and tool has access only to precisely what they need. \n\n- **Deploy:** \nAt the deployment stage, a DevSecOps practitioner will work to ensure that code makes it to production only if it has passed security checks at each previous stage. This can involve applying automated tests to application code and the underlying infrastructure used to run the software in production to catch any run-time security concerns.\n\n- **Operate and monitor:** \nIn the operations and [monitoring][4] stages of a DevSecOps pipeline, organizations will often use application-level and infrastructure metrics to identify unusual activity that could indicate a security breach. When an incident occurs, use logging and other instrumentation can be used to pinpoint the issue and understand its impact.\n\n## DevSecOps automation principles\n\nWhen it’s correctly implemented, automation accelerates the SDLC by enabling people to use technology to accomplish repetitive, manual tasks and deliver higher-quality software faster. DevSecOps takes automation further by integrating security tests across all stages of the SDLC to improve speed, consistency, and mitigate against potential risks. \n\nIf DevSecOps makes security everyone’s responsibility, DevSecOps automation strives to give everyone the tools they need to ensure code and configurations are secure without requiring them to become security specialists.\n\nWhen considering where to apply automation in your own DevSecOps pipeline, consider the following principles:\n\n- **Automation should be strategic:** \nA DevOps practice often seeks to use automation to facilitate speed and quality across the SDLC. But just as being strategic is important in a DevOps practice, it’s equally—if not more—important to be strategic about how and when automation is applied in a DevSecOps environment. \n\n- **Let people focus on being creative:** \nAutomate repetitive tasks wherever possible. That way, people can save their time and mental energy for more involved work while checks are applied more consistently and at scale.\n\n- **Systematize code review:** \nUse [tools][5] such as static application security testing to automate elements of your code review. Human-led code review is still important though and it’s critical to ensure your code review checklist covers security issues specific to your technology stack. Create a feedback cycle so each time a new information becomes available you build it into the checklist. For example, when an incident occurs consider how you could have caught the problem earlier with a code review or automated test.\n\n *[Learn how GitHub Advanced Security offers leading-edge security tooling for DevSecOps organizations \u003e ][6]*\n\n\u003cbr /\u003e\n\n![Reflect tools][7]\n\n\u003cbr /\u003e\n\n## DevSecOps toolchain\n\nAdopting DevSecOps starts with a cultural shift that involves making security a core concern of everyone involved in the SDLC. To accomplish this, organizations will often adopt new processes and build a DevSecOps toolchain that applies automated security tests and security tooling to the SDLC.\n\nDevSecOps tooling often builds on common DevOps tools such as CI/CD, automated tests, configuration management, and monitoring. The goal is to integrate security-focused tooling into each stage of the product life cycle. \n\n### Key components of the DevSecOps toolchain\n\n- **Automated security tests on commits and merges:** \nA basic goal of any DevSecOps practice is to catch issues in code before they can do harm by triggering automatic scans using pre-commit and merge triggers. Some of the scans organizations might implement include:\n\n - **Code scanning:** Often called static application security testing, this evaluates code at rest—in other words, without having to run it—to discover code that could lead to a vulnerability.\n\n - **Vulnerability scanning:** Dynamic application scanning tools build and deploy the application to a sandboxed environment and then observe how it responds to known security threats.\n\n - **Secret scanning:** Even with the most stringent policies, secrets occasionally make it into a commit. Secret scanning tools are used to catch them before the commit is made. These also pair with SCA tools, which are used to detect any vulnerabilities in open source dependencies within a given codebase. \n\n*[Explore how GitHub enables DevSecOps organizations to apply in-depth automated security tests at all stages of the SDLC \u003e][6]*\n\n- **Configuration management:** In DevSecOps, a general rule is it’s best to remove the uncertainty from systems configuration—and this is often accomplished by adopting infrastructure as code. Tools such as Docker, Terraform, and Ansible use YAML and similar configuration files that can be automatically scanned for issues, committed to version control, and rolled out automatically to multiple instances of a service. \n\n*[Find out how GitHub helps DevSecOps organizations manage application and system configurations through automation \u003e ][8]*\n\n- **Container orchestration:** In some environments, organizations may adopt a microservices architecture to better support complex, cloud-native applications. This requires maintaining multiple [containers][9] and scaling them as needed and securely—and that involves container orchestration tools. Just like configuration management tools, container orchestration tooling will often use YAML configuration files to dictate interactions between containers. \n\n- **Runtime verification:** Also known as runtime application self-protection tools, these tools will actively monitor and/or direct threats towards your application as it runs with reports highlighting any vulnerabilities.\n\n- **Continuous monitoring and reporting:** One of the simplest yet highly effective aspects of DevSecOps tooling is measurement—and that involves logging everything at the application and infrastructure level. The best tools will provide real-time intelligence when something goes wrong and include a reporting system so you can catch issues early. Outbound data from an unexpected port, for example, could indicate a compromise but without monitoring and reporting it might go undetected.\n\n## The bottom line\n\nSecurity is a defining issue in software development organizations today. Getting it wrong has far-reaching implications—both for the organizations and even the individuals involved. DevSecOps offers a framework for creating software securely from the very first step. And building on the well understood culture and processes of [DevOps means][10] that, for most businesses, a shift left to DevSecOps is a natural evolution.\n\n## Build your DevSecOps practice on GitHub\n\nGitHub is an integrated platform that takes companies from idea to planning to building to production, combining a focused developer experience with powerful, fully managed development, automation, and test infrastructure. \n\n[Compare pricing plans][11] \u003e \n\n\u003cbr /\u003e\u003cbr /\u003e\n\n\u003e Our philosophy is to build automation and great [DevOps][12] for the company you will be tomorrow.\n\nSenior SCM Engineer Todd O'Connor at [Adobe][13]\n\n\u003cbr /\u003e\u003cbr /\u003e\n| Go from planning to building | Increase developer velocity |\n| ---------- | ---------- |\n| Build roadmap plans right next to your codebase and quickly assign tasks to team members with powerful project boards and tables that are fully integrated into your project.\u003cbr /\u003e\u003cbr /\u003e [Learn about GitHub Issues \u003e](https://github.com/features/issues) | Reduce the time to commit. Eliminate environment management and context switching for your developers. Simplify IT procurement and maintenance with a secure, managed space in the cloud. \u003cbr /\u003e\u003cbr /\u003e [Explore Codespaces \u003e](https://github.com/features/codespaces) |\n\u003cbr /\u003e\u003cbr /\u003e\n\n| Automate everything | Secure your code as you write it |\n|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|\n| Automate all your software development workflows with GitHub Actions. Scale reliably and securely with powerful development, test, and automation infrastructure, fully managed by GitHub.\u003cbr /\u003e\u003cbr /\u003e [Learn more about GitHub Actions \u003e](https://github.com/features/actions) | Secure your code, dependencies, tokens, and sensitive data through the entire software development lifecycle and automatically resolve vulnerabilities. \u003cbr /\u003e\u003cbr /\u003e\u003cbr /\u003e [See how we help you stay secure \u003e](https://github.com/features/security/) |\n\n[1]: https://securitylab.github.com/\n[2]: https://resources.github.com/devops/pipeline\n[3]: //images.ctfassets.net/wfutmusr1t3h/2yycTRb93twEoCbO5n75dW/a5026e233832255d6cc73904bb6a7139/infinity.png\n[4]: https://resources.github.com/devops/tools/monitoring\n[5]: https://resources.github.com/devops/tools/\n[6]: https://github.com/features/security\n[7]: //images.ctfassets.net/wfutmusr1t3h/TdLPy6OEyYXySYKKOdZqo/0a68a08304481769fa853fe55f60d468/Reflect_tools.png\n[8]: https://github.com/features/actions\n[9]: https://resources.github.com/devops/containerization\n[10]: https://resources.github.com/devops/\n[11]: https://github.com/pricing\n[12]: https://resources.github.com/devops/fundamentals/\n[13]: https://github.com/customer-stories/adobe\n[14]: https://github.com/features/issues\n[15]: https://github.com/features/codespaces\n[16]: https://github.com/features/security/","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5l3bCxrGU8PKu1Eh2TGlP3","type":"Entry","createdAt":"2022-05-27T02:06:39.010Z","updatedAt":"2024-03-01T01:04:32.620Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"article"}},"locale":"en-US"},"fields":{}},"gated":false,"sfCampaignID":"7015c000001SNN7AAO","campaign":"Resources_Contact_Us","contentForm":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3qHQ6eSp20iGQrFIfaBJnn","type":"Entry","createdAt":"2022-09-29T19:33:25.277Z","updatedAt":"2024-11-26T11:30:01.409Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":248,"revision":113,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"form"}},"locale":"en-US"},"fields":{"name":"Form_Ungated_Contact","title":"Wondering how GitHub can help your business?","subtitle":"Tell us more about your needs","eloquaFormName":"ContactUs_TemplateForm","formCTA":"Contact GitHub","formElements":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Euizanl72D7hjUPBu1cz4","type":"Entry","createdAt":"2023-04-04T12:27:44.815Z","updatedAt":"2024-11-26T11:37:30.225Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":372,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Last name","htmlName":"lastName","type":"text","placeholder":"Last name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6FMPEpNvfZnVg5o5pNdmAz","type":"Entry","createdAt":"2023-04-04T12:27:23.053Z","updatedAt":"2024-11-26T11:37:14.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":373,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"First name","htmlName":"firstName","type":"text","placeholder":"First name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6s0zB2lwQZz6ZhWkZQd5r0","type":"Entry","createdAt":"2022-09-29T18:54:51.900Z","updatedAt":"2024-11-26T11:36:43.185Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":234,"revision":112,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Work Email","htmlName":"emailAddress","type":"email","placeholder":"you@company.com","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3IumXBD9IQf1aCt2cTCoVh","type":"Entry","createdAt":"2023-06-23T19:25:51.253Z","updatedAt":"2024-11-26T11:36:56.805Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":212,"revision":105,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Phone","htmlName":"phone1","type":"tel","placeholder":"12 3456 7890","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5HOQnFx9120Wj4hlsjXaJn","type":"Entry","createdAt":"2022-03-12T20:19:03.843Z","updatedAt":"2024-11-26T11:37:58.388Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":374,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Company","htmlName":"company","type":"text","placeholder":"Acme, Inc","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1MS9X9RNVd6BmPN91fMsVg","type":"Entry","createdAt":"2022-09-29T19:31:39.832Z","updatedAt":"2024-11-26T11:37:05.764Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":209,"revision":104,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"What can we help you with?","htmlName":"contactComments","type":"textarea","placeholder":"Tell us how we can help. For support questions, head to github.com/contact ","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5zNCZ4hVsez1AWpp6Fga7h","type":"Entry","createdAt":"2022-03-12T20:23:32.191Z","updatedAt":"2024-11-20T14:58:44.487Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCustomerGUID","type":"hidden","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7a3HDjJcLkWmsPKHATLvna","type":"Entry","createdAt":"2022-03-12T20:24:00.556Z","updatedAt":"2024-11-20T14:58:44.527Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":18,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCookieWrite","type":"hidden","required":false,"defaultValue":"0"}}]}},"headerImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4h4pRGrs2KDTg0fBoUPTc3","type":"Asset","createdAt":"2022-09-12T11:46:53.740Z","updatedAt":"2024-03-22T14:04:07.425Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":5,"locale":"en-US"},"fields":{"title":"DevOps - Productivity pillar - Dark 3","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/4h4pRGrs2KDTg0fBoUPTc3/82068b450fb4cd43ca4b5b217d6cfe2b/Productivity-DarkMode-3.webp","details":{"size":443552,"image":{"width":2400,"height":1260}},"fileName":"Productivity-DarkMode-3.webp","contentType":"image/webp"}}},"buttonCTA":"Contact GitHub","publicationDate":"2022-05-23T00:00","hidden":false,"rendersRichText":false,"marketoCampaign":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2ywGzPlFH9kTdiOBF75ggA","type":"Entry","createdAt":"2023-09-15T23:09:46.917Z","updatedAt":"2024-11-20T14:58:44.542Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":7,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"marketoCampaign"}},"locale":"en-US"},"fields":{"title":"CO-GHG-CONTACT-FY23-10Oct-01-WW-Resources-Contact-Request/406214","cDLProgramName":"406214","source":"Contact Request","formFields":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6z2cGa4cuvoWqGxS3Ejhv4","type":"Entry","createdAt":"2023-09-12T16:31:47.760Z","updatedAt":"2024-11-26T11:32:18.468Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":127,"revision":59,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"sFDCLastCampaignStatus","htmlName":"sFDCLastCampaignStatus","type":"hidden","required":false,"defaultValue":"Responded"}}],"active":true}}}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"45645kbxQEmwC1v5sSVHWd","type":"Entry","createdAt":"2022-05-27T02:08:34.923Z","updatedAt":"2024-05-07T16:27:24.829Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{"metaTitle":"The Fundamentals of DevSecOps in DevOps","metaDescription":"The meaning of DevSecOps is a combination of development, security, and operations automating the integration of security into every phase of the software development lifecycle."}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2cDa8WZbUYTa7rS7tV4tvp","type":"Entry","createdAt":"2024-09-06T13:41:28.985Z","updatedAt":"2024-09-11T13:01:56.267Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/events/build-stuff-lithuania-2024","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"9nZpUNygHlRPQzslrnTg1","type":"Entry","createdAt":"2024-09-06T13:41:29.022Z","updatedAt":"2024-10-03T12:22:02.080Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"Resource Page for /events/build-stuff-lithuania-2024","title":"Build Stuff Lithuania","description":"#1 Software Development Conference for Developers, Software Architects, and Tech team leads","body":"Build Stuff 2024 will attract software developers, team leads, and CTOs in a uniquely multifaceted setting, showcasing innovative technology as well as EXCEPTIONAL EDUCATION \u0026 NETWORKING OPPORTUNITIES.\n\nWith a diverse guest list of influential policymakers, software development companies, and high-end executives, Build Stuff is the ‘EVENT OF THE YEAR’ for every company and developer in the software development field. This unique conference can help you attain or even surpass your goals, whatever they may be.","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1Il3oB88w5jPygQrLGRAIi","type":"Entry","createdAt":"2024-09-06T13:41:29.045Z","updatedAt":"2024-10-03T12:52:33.191Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"event"}},"locale":"en-US"},"fields":{"startTime":"2024-11-13T09:00+02:00","endTime":"2024-11-15T18:00+02:00","location":"Lithuania","speakers":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7vePCd4zeREwsEQydwFIxU","type":"Entry","createdAt":"2024-09-05T09:42:10.551Z","updatedAt":"2024-11-26T11:43:24.845Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":53,"revision":26,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Joseph Katsioloudes","avatar":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"454KCkAzNVz3Vd7ZN1k9W0","type":"Asset","createdAt":"2024-09-05T09:42:10.375Z","updatedAt":"2024-09-06T13:41:28.954Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":3,"locale":"en-US"},"fields":{"title":"Joseph Katsioloudes","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/454KCkAzNVz3Vd7ZN1k9W0/1a00f5fbfe6df1972918cfb1f318727d/jkcso-prof-photo-small.jpg","details":{"size":203875,"image":{"width":851,"height":1026}},"fileName":"jkcso-prof-photo-small.jpg","contentType":"image/jpeg"}}},"title":"Senior Developer Advocate","company":"GitHub","bio":"Joseph is a security expert who empowers developers to ship secure software through his research and education work at the GitHub Security Lab. His recent contributions include video content with combined 1M+ views packed with practical security tips, and the free game gh.io/securecodegame for software developers who want to build a security skillset with 3K+ players worldwide in the first 6 months. As a speaker with 36 talks in the past 2 years, he captivates audiences with his insights and dynamic presentation style."}}],"externalLink":"https://www.buildstuff.events/","eventType":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3WlH36Y45eTchbEmePi3k3","type":"Entry","createdAt":"2024-04-29T16:04:20.836Z","updatedAt":"2024-09-06T13:41:29.135Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"eventType"}},"locale":"en-US"},"fields":{"title":"Event Type: Conference","text":"conference"}}}},"gated":false,"headerImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"48Dc1TpQ1JECrd3O0Zm2VZ","type":"Asset","createdAt":"2024-09-06T13:41:28.957Z","updatedAt":"2024-09-06T13:41:28.957Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Build Stuff Lithuania","description":"#1 Software Development Conference for Developers, Software Architects, and Tech team leads","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/48Dc1TpQ1JECrd3O0Zm2VZ/6b29f979ed60be99a49672d2a188ab26/BuildStuff.png","details":{"size":2027344,"image":{"width":1944,"height":818}},"fileName":"BuildStuff.png","contentType":"image/png"}}},"headerCTA":"Learn more","buttonCTA":"Learn more","publicationDate":"2024-09-06T00:00","renderedDate":"13-15 November 2024","hidden":false,"rendersRichText":false}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2IjohZkaw37arhkp71Totm","type":"Entry","createdAt":"2024-09-06T13:41:29.336Z","updatedAt":"2024-10-03T12:21:59.321Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{"metaTitle":"Build Stuff Lithuania","metaDescription":"#1 Software Development Conference for Developers, Software Architects, and Tech team leads","openGraphTitle":"Build Stuff Lithuania","openGraphDescription":"#1 Software Development Conference for Developers, Software Architects, and Tech team leads"}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5R9zfL5sHOvIqOX4WnG1mJ","type":"Entry","createdAt":"2024-01-11T21:00:30.758Z","updatedAt":"2024-11-26T10:53:17.315Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":85,"revision":44,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"github-advanced-security","label":"GitHub Advanced Security"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"30jxd01lzaVcW2aRJaGbLm","type":"Entry","createdAt":"2024-09-09T13:45:31.541Z","updatedAt":"2024-10-09T18:27:12.216Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":15,"revision":7,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security-lab","label":"Security Lab"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"13vIJfCXYXYh4KikbTbdp6","type":"Entry","createdAt":"2024-10-14T20:06:14.236Z","updatedAt":"2024-10-14T20:06:14.236Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/events/constellation-joburg","seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"717KpK7xmjt1JwMuyTAiGf","type":"Entry","createdAt":"2024-10-14T19:52:58.871Z","updatedAt":"2024-10-22T13:55:06.224Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":4,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{"metaTitle":"Constellation 2024: GitHub’s Premier Developer Conference in South Africa","metaDescription":"Join Constellation 2024, GitHub’s in-person developer conference in Johannesburg. Explore AI, Collaboration, Community, and Security with industry leaders and participate in a hands-on hackathon focused on social impact.","metaImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6M6vRsGVY4Z5RR0zGayrDm","type":"Asset","createdAt":"2024-10-14T19:39:43.439Z","updatedAt":"2024-10-14T19:39:43.439Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"GitHub Constellation South Africa","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/6M6vRsGVY4Z5RR0zGayrDm/e6d975e106c97403d585ba4b9f15bca8/hero-constellation.png","details":{"size":1208510,"image":{"width":2400,"height":1260}},"fileName":"hero-constellation.png","contentType":"image/png"}}},"openGraphTitle":"Constellation 2024: GitHub’s Developer Conference in Johannesburg","openGraphDescription":"Join GitHub’s Constellation 2024 in Johannesburg for a full day of learning, collaboration, and innovation. Featuring AI-focused sessions, GitHub Copilot training, a hackathon, and a keynote by GitHub CEO Thomas Dohmke."}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6ugth2XnkhdWN46UK5gb7b","type":"Entry","createdAt":"2024-01-11T21:00:29.738Z","updatedAt":"2024-10-09T18:28:03.127Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":28,"revision":14,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"cloud","label":"Cloud"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3vQGRghKWPkjZOXF1XJQ1h","type":"Entry","createdAt":"2024-01-11T21:00:33.222Z","updatedAt":"2024-10-09T18:27:56.917Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":75,"revision":38,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"developer-productivity","label":"Developer Productivity"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7wXHiRnPRdKceDxtr3CQRj","type":"Entry","createdAt":"2024-01-11T21:00:26.704Z","updatedAt":"2024-11-26T10:53:41.980Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":119,"revision":60,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"github-actions","label":"GitHub Actions"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6pxXKKKDPAgHO6RN44qaQ","type":"Entry","createdAt":"2024-01-11T21:00:30.179Z","updatedAt":"2024-10-09T18:27:45.823Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":27,"revision":14,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"opensource","label":"Open Source"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1hE6fjVTs38kbzDviYCJcF","type":"Entry","createdAt":"2024-01-11T21:00:25.764Z","updatedAt":"2024-10-09T18:27:34.550Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":22,"revision":11,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"web-development","label":"Web Development"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2UAcvr6PzVPi56m6nsBv2F","type":"Entry","createdAt":"2024-03-19T16:15:17.347Z","updatedAt":"2024-10-09T18:27:26.169Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":21,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"startups","label":"Startups"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2rym8Y8A56ngjMrr6oSlmh","type":"Entry","createdAt":"2024-01-11T21:00:35.775Z","updatedAt":"2024-11-26T10:53:25.505Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":194,"revision":98,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"devops","label":"DevOps"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2rA4e4cxa38jUCur3Bhm8V","type":"Entry","createdAt":"2024-01-11T21:00:25.343Z","updatedAt":"2024-10-09T18:27:20.797Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":30,"revision":16,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"software-development","label":"Software Development"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1W2ZAgfSK2jhEsyHPYV3ic","type":"Entry","createdAt":"2024-01-11T21:00:29.315Z","updatedAt":"2024-11-26T10:53:50.537Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":170,"revision":86,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"ai","label":"AI"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}}],"settings":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"LWmmcZOWG55rwQfwAumwE","type":"Entry","createdAt":"2024-10-14T19:50:19.827Z","updatedAt":"2024-10-14T20:03:09.129Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"/events/constellation-joburg","hasMinimalFooter":false,"isHidden":false}}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6rMgBauS5tzkJLqA4KVwL1","type":"Entry","createdAt":"2024-09-06T13:17:51.852Z","updatedAt":"2024-09-11T13:01:28.011Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":4,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/events/devoxx-belgium-2024","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6iEhRYjER372wvSHNKZrOv","type":"Entry","createdAt":"2024-09-06T13:17:52.288Z","updatedAt":"2024-09-06T13:17:52.288Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"Resource Page for /events/devoxx-belgium-2024","title":"Devoxx Belgium 2024","description":"Devoxx Belgium 2024 (21st edition), a 5-day technology conference, is expected to draw over 3,500 attendees. With tickets selling out in just a few seconds last year, we anticipate the same level of excitement and rapid sell-out this year!","body":"This year’s event will showcase some of the most innovative and inspiring speakers in the industry, with a special focus on Java 23 and Generative AI. Attendees will experience a diverse range of local and global talent, presenting groundbreaking developments in programming such as Java, Cloud, AI \u0026 Big Data, Security, Architecture, Programming Languages, Methodologies, and Developer Culture.\n\nAttending Devoxx Belgium provides an excellent opportunity to expand your knowledge, sharpen your skills, and gain hands-on experience with the latest technologies, especially in AI and its applications.\n\nDevoxx, a series of technology conferences, is held in various countries including Belgium, France, the UK, Poland, Morocco, Ukraine and Greece. Additionally, our platform for smaller events, VoxxedDays, is organized in various locations globally.","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"734kOH7GhQ6jLuIakHCw5R","type":"Entry","createdAt":"2024-09-06T13:17:52.350Z","updatedAt":"2024-10-03T12:52:30.556Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"event"}},"locale":"en-US"},"fields":{"startTime":"2024-10-07T09:00+01:00","endTime":"2024-10-11T18:00+01:00","location":"Belgium","speakers":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7vePCd4zeREwsEQydwFIxU","type":"Entry","createdAt":"2024-09-05T09:42:10.551Z","updatedAt":"2024-11-26T11:43:24.845Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":53,"revision":26,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Joseph Katsioloudes","avatar":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"454KCkAzNVz3Vd7ZN1k9W0","type":"Asset","createdAt":"2024-09-05T09:42:10.375Z","updatedAt":"2024-09-06T13:41:28.954Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":3,"locale":"en-US"},"fields":{"title":"Joseph Katsioloudes","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/454KCkAzNVz3Vd7ZN1k9W0/1a00f5fbfe6df1972918cfb1f318727d/jkcso-prof-photo-small.jpg","details":{"size":203875,"image":{"width":851,"height":1026}},"fileName":"jkcso-prof-photo-small.jpg","contentType":"image/jpeg"}}},"title":"Senior Developer Advocate","company":"GitHub","bio":"Joseph is a security expert who empowers developers to ship secure software through his research and education work at the GitHub Security Lab. His recent contributions include video content with combined 1M+ views packed with practical security tips, and the free game gh.io/securecodegame for software developers who want to build a security skillset with 3K+ players worldwide in the first 6 months. As a speaker with 36 talks in the past 2 years, he captivates audiences with his insights and dynamic presentation style."}}],"externalLink":"https://devoxx.be/","eventType":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3WlH36Y45eTchbEmePi3k3","type":"Entry","createdAt":"2024-04-29T16:04:20.836Z","updatedAt":"2024-09-06T13:41:29.135Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"eventType"}},"locale":"en-US"},"fields":{"title":"Event Type: Conference","text":"conference"}}}},"gated":false,"headerImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2PbLYsOL4kK0KdgXFWqaL3","type":"Asset","createdAt":"2024-09-06T13:17:51.813Z","updatedAt":"2024-09-06T13:17:51.813Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Devoxx Belgium 2024","description":"Devoxx Belgium 2024 (21st edition), a 5-day technology conference, is expected to draw over 3,500 attendees. With tickets selling out in just a few seconds last year, we anticipate the same level of excitement and rapid sell-out this year!","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/2PbLYsOL4kK0KdgXFWqaL3/8b51e965e9a86e09d6843b353d12bba6/devoxxBelgium2024.png","details":{"size":4715095,"image":{"width":3066,"height":1272}},"fileName":"devoxxBelgium2024.png","contentType":"image/png"}}},"headerCTA":"Learn more","buttonCTA":"Learn more","publicationDate":"2024-09-06T00:00","renderedDate":"7-11 October 2024","hidden":false,"rendersRichText":false}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"40MmyAmebRLyKWWnMcRvVX","type":"Entry","createdAt":"2024-09-06T13:17:52.443Z","updatedAt":"2024-10-03T12:22:04.834Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{"metaTitle":"Devoxx Belgium 2024","metaDescription":"Devoxx Belgium 2024 (21st edition), a 5-day technology conference, is expected to draw over 3,500 attendees. With tickets selling out in just a few seconds last year, we anticipate the same level of excitement and rapid sell-out this year!","openGraphTitle":"Devoxx Belgium 2024","openGraphDescription":"Devoxx Belgium 2024 (21st edition), a 5-day technology conference, is expected to draw over 3,500 attendees. With tickets selling out in just a few seconds last year, we anticipate the same level of excitement and rapid sell-out this year!"}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2rym8Y8A56ngjMrr6oSlmh","type":"Entry","createdAt":"2024-01-11T21:00:35.775Z","updatedAt":"2024-11-26T10:53:25.505Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":194,"revision":98,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"devops","label":"DevOps"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2rA4e4cxa38jUCur3Bhm8V","type":"Entry","createdAt":"2024-01-11T21:00:25.343Z","updatedAt":"2024-10-09T18:27:20.797Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":30,"revision":16,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"software-development","label":"Software Development"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5R9zfL5sHOvIqOX4WnG1mJ","type":"Entry","createdAt":"2024-01-11T21:00:30.758Z","updatedAt":"2024-11-26T10:53:17.315Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":85,"revision":44,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"github-advanced-security","label":"GitHub Advanced Security"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1W2ZAgfSK2jhEsyHPYV3ic","type":"Entry","createdAt":"2024-01-11T21:00:29.315Z","updatedAt":"2024-11-26T10:53:50.537Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":170,"revision":86,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"ai","label":"AI"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"30jxd01lzaVcW2aRJaGbLm","type":"Entry","createdAt":"2024-09-09T13:45:31.541Z","updatedAt":"2024-10-09T18:27:12.216Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":15,"revision":7,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security-lab","label":"Security Lab"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6gg2XTZT1KHMFnMmtKB1Fo","type":"Entry","createdAt":"2024-09-04T20:32:30.457Z","updatedAt":"2024-09-09T13:45:48.576Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/events/orange-con-2024","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5qiXDnriD925KDGYLfSnWX","type":"Entry","createdAt":"2024-09-04T20:32:30.555Z","updatedAt":"2024-10-03T12:22:19.678Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":22,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"Resource Page for /events/orange-con-2024","title":"OrangeCon","description":"The New Dutch Cybersecurity Conference","body":"Experience the Hackers Community in The Netherlands! OrangeCon is a community driven, non-profit Cybersecurity Conference in the heart of The Netherlands. Meet old and new friends, listen to talks of Dutch leading cybersecurity experts, and level up your knowledge in one of our trainings.","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"cg4MaNgJhfub1uPY2b7Az","type":"Entry","createdAt":"2024-09-04T20:32:30.577Z","updatedAt":"2024-10-03T12:52:35.818Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":17,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"event"}},"locale":"en-US"},"fields":{"startTime":"2024-09-05T09:00+01:00","endTime":"2024-09-05T18:00+01:00","location":"Netherlands","speakers":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4Na31cMZxUOZjq9ib93m5E","type":"Entry","createdAt":"2024-09-04T19:46:23.090Z","updatedAt":"2024-10-09T18:41:51.244Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":21,"revision":8,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Sylwia Budzynska","avatar":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"Qbtxc5XQh5lHsMVYxG0xN","type":"Asset","createdAt":"2024-09-04T19:44:25.286Z","updatedAt":"2024-09-04T19:44:25.286Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"sb","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/Qbtxc5XQh5lHsMVYxG0xN/4169adf0a82c47696074dd14ad47de6b/sb.jpeg","details":{"size":72448,"image":{"width":767,"height":767}},"fileName":"sb.jpeg","contentType":"image/jpeg"}}},"title":"Security Researcher","company":"GitHub","bio":"Sylwia is security researcher at GitHub Security Lab, where she works with finding vulnerabilities in open source software. See hers, as well as other Security Lab researchers' advisories at securitylab.github.com/advisories. In her free time, she enjoys Magic The Gathering and other TCGs, reading, and playing JRPGs."}}],"externalLink":"https://orangecon.nl/","eventType":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3WlH36Y45eTchbEmePi3k3","type":"Entry","createdAt":"2024-04-29T16:04:20.836Z","updatedAt":"2024-09-06T13:41:29.135Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"eventType"}},"locale":"en-US"},"fields":{"title":"Event Type: Conference","text":"conference"}}}},"gated":false,"headerImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"QpcTjfjZjWHKeAsy3MC2Z","type":"Asset","createdAt":"2024-09-04T20:32:30.424Z","updatedAt":"2024-09-04T20:32:30.424Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"OrangeCon 2024","description":"The New Dutch Cybersecurity Conference","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/QpcTjfjZjWHKeAsy3MC2Z/7475d6a49211986214ecc5299af14c0f/Screenshot_2024-09-04_at_22.53.52.png","details":{"size":1694151,"image":{"width":1636,"height":1090}},"fileName":"Screenshot 2024-09-04 at 22.53.52.png","contentType":"image/png"}}},"headerCTA":"Learn more","buttonCTA":"Learn more","publicationDate":"2024-09-04T00:00","renderedDate":"September 5, 2024","hidden":false,"rendersRichText":false}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2xijmTk4ZVsfUCnZeq2sai","type":"Entry","createdAt":"2024-09-04T20:32:30.720Z","updatedAt":"2024-10-03T12:20:41.730Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{"metaTitle":"OrangeCon 2024","metaDescription":"The New Dutch Cybersecurity Conference","openGraphTitle":"OrangeCon 2024","openGraphDescription":"The New Dutch Cybersecurity Conference"}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5R9zfL5sHOvIqOX4WnG1mJ","type":"Entry","createdAt":"2024-01-11T21:00:30.758Z","updatedAt":"2024-11-26T10:53:17.315Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":85,"revision":44,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"github-advanced-security","label":"GitHub Advanced Security"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1ZjQDPJVVVexnIuDxA6sTe","type":"Entry","createdAt":"2024-01-11T21:00:23.186Z","updatedAt":"2024-10-09T18:27:29.216Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"tools","label":"Tools"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"30jxd01lzaVcW2aRJaGbLm","type":"Entry","createdAt":"2024-09-09T13:45:31.541Z","updatedAt":"2024-10-09T18:27:12.216Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":15,"revision":7,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security-lab","label":"Security Lab"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1dQFjYyqgWkd3DslyBIWvh","type":"Entry","createdAt":"2024-09-05T09:42:10.408Z","updatedAt":"2024-09-11T13:02:11.449Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/events/soss-community-day-eu-2024","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5i0UaDFJMw6wetc40FghIX","type":"Entry","createdAt":"2024-09-05T09:42:10.502Z","updatedAt":"2024-09-05T09:42:10.502Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"Resource Page for /events/soss-community-day-eu-2024","title":"SOSS Community Day Europe","description":"Secure Open Source Software (SOSS) Community Days are an opportunity for Community Members from across the Security and Open Source ecosystem to get together and share ideas and progress on capabilities that make it easier to sustainably secure the development, maintenance, and consumption of the open source software (OSS) we all depend on.","body":"SOSS Community Days are held regionally, alongside the Open Source Summits and were formerly called OpenSSF Days. The change in name reflects the need to capture the broader interest in the security of open source software. What’s in the SOSS? Come to a Community Day to find out! Brought to you by OpenSSF.","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"01zO9LIOAE7iHjUw83vr5C","type":"Entry","createdAt":"2024-09-05T09:42:10.523Z","updatedAt":"2024-09-05T09:42:10.523Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"event"}},"locale":"en-US"},"fields":{"startTime":"2024-09-19T09:00+01:00","endTime":"2024-09-19T18:00+01:00","location":"Austria","speakers":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7vePCd4zeREwsEQydwFIxU","type":"Entry","createdAt":"2024-09-05T09:42:10.551Z","updatedAt":"2024-11-26T11:43:24.845Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":53,"revision":26,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Joseph Katsioloudes","avatar":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"454KCkAzNVz3Vd7ZN1k9W0","type":"Asset","createdAt":"2024-09-05T09:42:10.375Z","updatedAt":"2024-09-06T13:41:28.954Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":3,"locale":"en-US"},"fields":{"title":"Joseph Katsioloudes","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/454KCkAzNVz3Vd7ZN1k9W0/1a00f5fbfe6df1972918cfb1f318727d/jkcso-prof-photo-small.jpg","details":{"size":203875,"image":{"width":851,"height":1026}},"fileName":"jkcso-prof-photo-small.jpg","contentType":"image/jpeg"}}},"title":"Senior Developer Advocate","company":"GitHub","bio":"Joseph is a security expert who empowers developers to ship secure software through his research and education work at the GitHub Security Lab. His recent contributions include video content with combined 1M+ views packed with practical security tips, and the free game gh.io/securecodegame for software developers who want to build a security skillset with 3K+ players worldwide in the first 6 months. As a speaker with 36 talks in the past 2 years, he captivates audiences with his insights and dynamic presentation style."}}],"externalLink":"https://events.linuxfoundation.org/soss-community-day-europe/","eventType":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3WlH36Y45eTchbEmePi3k3","type":"Entry","createdAt":"2024-04-29T16:04:20.836Z","updatedAt":"2024-09-06T13:41:29.135Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"eventType"}},"locale":"en-US"},"fields":{"title":"Event Type: Conference","text":"conference"}}}},"gated":false,"headerImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3AaasB0HDcygJBseCON2FI","type":"Asset","createdAt":"2024-09-05T09:42:10.381Z","updatedAt":"2024-09-05T09:42:10.381Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"SOSS Community Day Europe","description":"Secure Open Source Software (SOSS) Community Days are an opportunity for Community Members from across the Security and Open Source ecosystem to get together and share ideas and progress on capabilities that make it easier to sustainably secure the development, maintenance, and consumption of the open source software (OSS) we all depend on. SOSS Community Days are held regionally, alongside the Open Source Summits and were formerly called OpenSSF Days. The change in name reflects the need to capture the broader interest in the security of open source software. What’s in the SOSS? Come to a Community Day to find out! Brought to you by OpenSSF.","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/3AaasB0HDcygJBseCON2FI/67f268b155d75c6ae548d3bd6c4a1c0b/SOSS.png","details":{"size":122039,"image":{"width":1196,"height":722}},"fileName":"SOSS.png","contentType":"image/png"}}},"headerCTA":"Learn more","buttonCTA":"Learn more","publicationDate":"2024-09-05T00:00","renderedDate":"September 19, 2024","hidden":false,"rendersRichText":false}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3ICaptJLCM3KqOxGCfcto9","type":"Entry","createdAt":"2024-09-05T09:42:10.568Z","updatedAt":"2024-10-03T12:20:44.495Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{"metaTitle":"SOSS Community Day Europe","metaDescription":"Secure Open Source Software (SOSS) Community Days are an opportunity for Community Members from across the Security and Open Source ecosystem to get together and share ideas and progress on capabilities that make it easier to sustainably secure the development, maintenance, and consumption of the open source software we all depend on.","openGraphTitle":"SOSS Community Day Europe","openGraphDescription":"Secure Open Source Software (SOSS) Community Days are an opportunity for Community Members from across the Security and Open Source ecosystem to get together and share ideas and progress on capabilities that make it easier to sustainably secure the development, maintenance, and consumption of the open source software we all depend on."}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6pxXKKKDPAgHO6RN44qaQ","type":"Entry","createdAt":"2024-01-11T21:00:30.179Z","updatedAt":"2024-10-09T18:27:45.823Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":27,"revision":14,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"opensource","label":"Open Source"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5R9zfL5sHOvIqOX4WnG1mJ","type":"Entry","createdAt":"2024-01-11T21:00:30.758Z","updatedAt":"2024-11-26T10:53:17.315Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":85,"revision":44,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"github-advanced-security","label":"GitHub Advanced Security"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"30jxd01lzaVcW2aRJaGbLm","type":"Entry","createdAt":"2024-09-09T13:45:31.541Z","updatedAt":"2024-10-09T18:27:12.216Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":15,"revision":7,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security-lab","label":"Security Lab"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"58u2m2iqJmi5SyQLQRGgSo","type":"Entry","createdAt":"2024-06-20T14:29:08.759Z","updatedAt":"2024-07-30T15:22:30.722Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":4,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/events/universe","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5Q0da5RZNGEYMgtrix0607","type":"Entry","createdAt":"2024-06-20T14:29:08.851Z","updatedAt":"2024-10-03T12:25:51.562Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":25,"revision":6,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"Resource Page for /events/universe","title":"GitHub Universe 2024","description":"Join us for the 10th anniversary of GitHub Universe on October 29-30 in San Francisco, CA, or virtually, to experience the magic of the world’s fair of software. ","body":"With over 150+ speakers, 100+ sessions, and countless networking opportunities, you’ll gain the knowledge and expertise you need to harness the full power of GitHub, the world’s leading AI-powered developer platform. Discover how to enhance team productivity, foster career growth, make powerful connections, and drive meaningful change with the latest in AI, DevEx, and security. ","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7GyXmCpXaZVy1EGyd3rzbT","type":"Entry","createdAt":"2024-06-20T14:29:08.888Z","updatedAt":"2024-10-03T12:55:42.906Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"event"}},"locale":"en-US"},"fields":{"startTime":"2024-10-29T00:00-04:00","endTime":"2024-10-30T00:00-04:00","location":"USA","speakers":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1FtheHuhHnzTVSV4rH6mRb","type":"Entry","createdAt":"2023-10-11T05:55:37.541Z","updatedAt":"2024-11-26T11:52:04.004Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":61,"revision":27,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Thomas Dohmke","avatar":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"40sDt0fs5Gjycvw0HTBrcx","type":"Asset","createdAt":"2024-01-23T07:42:03.963Z","updatedAt":"2024-07-02T13:34:17.974Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"Thomas Dohmke","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/40sDt0fs5Gjycvw0HTBrcx/863638defa58a2f50cb390910f04e07b/Thomas_Dohmke.png","details":{"size":55459,"image":{"width":200,"height":200}},"fileName":"Thomas Dohmke.png","contentType":"image/png"}}},"title":"CEO","company":"GitHub"}}],"externalLink":"https://githubuniverse.com/?utm_source=Events\u0026utm_medium=GitHub\u0026utm_campaign=events-page","eventType":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3WlH36Y45eTchbEmePi3k3","type":"Entry","createdAt":"2024-04-29T16:04:20.836Z","updatedAt":"2024-09-06T13:41:29.135Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"eventType"}},"locale":"en-US"},"fields":{"title":"Event Type: Conference","text":"conference"}}}},"gated":false,"headerImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2sX2KYqfnGuZTqWIDUUdEI","type":"Asset","createdAt":"2024-06-20T14:29:08.730Z","updatedAt":"2024-06-20T14:29:08.730Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"universe","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/2sX2KYqfnGuZTqWIDUUdEI/5e36aaaab860a3bd4e026fa52d597d87/og-image-24.jpg","details":{"size":98944,"image":{"width":1200,"height":630}},"fileName":"og-image-24.jpg","contentType":"image/jpeg"}}},"headerCTA":"Learn more","buttonCTA":"Learn more","publicationDate":"2024-07-29T00:00","renderedDate":"October 29-30, 2024","hidden":false,"rendersRichText":false}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1W2ZAgfSK2jhEsyHPYV3ic","type":"Entry","createdAt":"2024-01-11T21:00:29.315Z","updatedAt":"2024-11-26T10:53:50.537Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":170,"revision":86,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"ai","label":"AI"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2rym8Y8A56ngjMrr6oSlmh","type":"Entry","createdAt":"2024-01-11T21:00:35.775Z","updatedAt":"2024-11-26T10:53:25.505Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":194,"revision":98,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"devops","label":"DevOps"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"MeLE7FTfRSS7jrQvZatuK","type":"Entry","createdAt":"2024-10-21T12:10:38.072Z","updatedAt":"2024-11-19T14:04:42.444Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/github-secure-open-source-fund","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7gPredmrJn87BpSBTs6BuC","type":"Entry","createdAt":"2024-10-21T12:10:38.161Z","updatedAt":"2024-11-19T16:59:54.141Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":51,"revision":11,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"containerLandingPage"}},"locale":"en-US"},"fields":{"title":"/open-source-security-fund","sections":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6obaaGT2L2oaydB5POxQO7","type":"Entry","createdAt":"2024-10-21T12:10:38.179Z","updatedAt":"2024-11-19T16:59:54.239Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":18,"revision":6,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionHero"}},"locale":"en-US"},"fields":{"title":"/open-source-security-fund Hero","hero":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4nnuyhW3FCdiLoZgWyTdc8","type":"Entry","createdAt":"2024-10-21T12:10:38.197Z","updatedAt":"2024-11-26T11:22:52.957Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":46,"revision":13,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentHero"}},"locale":"en-US"},"fields":{"title":"/open-source-security-fund Hero","heading":"GitHub Secure Open Source Fund","text":"Powered by GitHub Sponsors","align":"Left"}},"backgroundImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3w2kJgNDag4FtnK5xUQANd","type":"Asset","createdAt":"2024-11-15T15:05:54.325Z","updatedAt":"2024-11-15T15:05:54.325Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":21,"revision":1,"locale":"en-US"},"fields":{"title":"Blue and green cube and semisphere with a purple helmet icon","description":"Blue and green cube and semisphere with a purple helmet icon","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/3w2kJgNDag4FtnK5xUQANd/92f9851db8ca84061ed7d12dea0a9461/Security_Sponsors_Page_4.webp","details":{"size":313204,"image":{"width":1920,"height":905}},"fileName":"Security Sponsors Page 4.webp","contentType":"image/webp"}}},"theme":"dark"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4KMM4f6retLd3Ew4jDGMbI","type":"Entry","createdAt":"2024-10-21T12:10:38.222Z","updatedAt":"2024-10-22T14:07:31.836Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionContentBlocks"}},"locale":"en-US"},"fields":{"title":"/open-source-security-fund Content Blocks - pillars","contentBlocks":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"69jdnXGryAcMI5tp9mtZ2R","type":"Entry","createdAt":"2024-10-21T12:10:38.243Z","updatedAt":"2024-10-24T14:24:19.861Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":4,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentContentBlock"}},"locale":"en-US"},"fields":{"title":"Enhanced open source security","imageType":"Fullwidth","heading":"Enhanced open source security","description":{"nodeType":"document","data":{},"content":[{"nodeType":"paragraph","data":{},"content":[{"nodeType":"text","value":"Investing in security for fast-growing dependencies that support larger projects can mitigate risks and enhance OSS security, especially in the age of AI. Providing funding directly to maintainers enables them to focus on security while giving them expert guidance and emergency support.","marks":[],"data":{}}]}]},"headingLevel":"h3"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"54iOtmiFoj4r2h74jKnTaL","type":"Entry","createdAt":"2024-10-21T12:10:38.261Z","updatedAt":"2024-10-24T14:24:19.884Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":13,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentContentBlock"}},"locale":"en-US"},"fields":{"title":"Agile, Effective Funding Model","imageType":"Fullwidth","heading":"Agile, Effective Funding Model","description":{"nodeType":"document","data":{},"content":[{"nodeType":"paragraph","data":{},"content":[{"nodeType":"text","value":"Linking OSS funding directly to security outcomes is essential for aligning incentives. This agile approach not only strengthens the security of your critical projects but also ensures ongoing support for the open source community.","marks":[],"data":{}}]}]},"headingLevel":"h3"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5sin179OykdA5PX8VaEA2J","type":"Entry","createdAt":"2024-10-21T12:10:38.312Z","updatedAt":"2024-10-24T14:24:19.961Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":4,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentContentBlock"}},"locale":"en-US"},"fields":{"title":"Scaled Ecosystem Impact","imageType":"Fullwidth","heading":"Scaled Ecosystem Impact","description":{"nodeType":"document","data":{},"content":[{"nodeType":"paragraph","data":{},"content":[{"nodeType":"text","value":"Join us in securing open source software for everyone around the world. By participating, you help scale open source security initiatives and provide vital resources and community support to under-resourced projects, effectively reducing risk for all.","marks":[],"data":{}}]}]},"headingLevel":"h3"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5tOFZwto83VTeVhCSWZ3KU","type":"Entry","createdAt":"2024-11-19T16:59:54.345Z","updatedAt":"2024-11-19T16:59:54.345Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionRivers"}},"locale":"en-US"},"fields":{"title":"/open-source-security-fund - River - Launch Funders","rivers":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7xZHvzsB1uFlSaMXzFDAsq","type":"Entry","createdAt":"2024-11-19T16:59:54.362Z","updatedAt":"2024-11-26T11:43:08.511Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":17,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentRiver"}},"locale":"en-US"},"fields":{"title":"/open-source-security-fund - River Logo","heading":"Funding Launch Partners","text":" ","media":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"wyyHY4zyRyYLWub88FJKO","type":"Asset","createdAt":"2024-11-19T16:59:54.125Z","updatedAt":"2024-11-19T16:59:54.125Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":1,"locale":"en-US"},"fields":{"title":"Company logos","description":"Company logos","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/wyyHY4zyRyYLWub88FJKO/923a71bf353149ac0fe1998b62622f69/Group_22__1_.png","details":{"size":126303,"image":{"width":2620,"height":939}},"fileName":"Group 22 (1).png","contentType":"image/png"}}},"align":"center","imageTextRatio":"50:50"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7xn0Qf0LCycn551fHRwdYY","type":"Entry","createdAt":"2024-10-21T12:10:38.327Z","updatedAt":"2024-11-26T10:56:28.854Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":33,"revision":11,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionTestimonials"}},"locale":"en-US"},"fields":{"title":"/open-source-security-fund Quote","heading":"Hear from our partners","testimonials":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5db9BhZ4DWjcwGc6NhBTKt","type":"Entry","createdAt":"2024-10-21T12:10:38.345Z","updatedAt":"2024-11-26T11:23:22.970Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":27,"revision":11,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentTestimonial"}},"locale":"en-US"},"fields":{"quote":"The technology program at the Alfred P. Sloan Foundation aligns open source practices with scientific research, helping ensure that open source technology improves security for everyone in the ecosystem.","name":"Josh Greenberg","jobTitle":"Sloan Foundation","image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2ieWlsYYfCvAct7ZIpxpso","type":"Asset","createdAt":"2024-10-21T12:10:38.035Z","updatedAt":"2024-10-21T12:10:38.035Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Sloan Foundation logo","description":"Sloan Foundation logo","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/2ieWlsYYfCvAct7ZIpxpso/dbd7d9552c1a7aeee923ab09ee8f703b/MzFpwY5P_400x400.png","details":{"size":3492,"image":{"width":400,"height":400}},"fileName":"MzFpwY5P_400x400.png","contentType":"image/png"}}}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5vBleTursIE1I5lONEuqZT","type":"Entry","createdAt":"2024-11-19T16:59:54.418Z","updatedAt":"2024-11-26T11:23:13.025Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":24,"revision":9,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentTestimonial"}},"locale":"en-US"},"fields":{"quote":"We're excited that the GitHub SOSS Fund will leverage OpenSSF community insights to support critical projects and developers with training, tools, and a network to strengthen software security.","name":"Christopher Robinson","jobTitle":"Chief Architect of OpenSSF at Linux Foundation","image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1CJInW9NPDSyMilDsVe57h","type":"Asset","createdAt":"2024-11-19T16:59:54.129Z","updatedAt":"2024-11-19T16:59:54.129Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":1,"locale":"en-US"},"fields":{"title":"openssf logo bw","description":"openssf logo","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/1CJInW9NPDSyMilDsVe57h/aeb238018d8c1c4b4faa81b0ed103973/openssf-horizontal-black.svg","details":{"size":35328,"image":{"width":1000,"height":385}},"fileName":"openssf-horizontal-black.svg","contentType":"image/svg+xml"}}}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1ZGd9lTy8yb0inzYrgmxr5","type":"Entry","createdAt":"2024-11-19T16:59:54.505Z","updatedAt":"2024-11-26T11:23:33.534Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentTestimonial"}},"locale":"en-US"},"fields":{"quote":"The security of open source software has long been a priority for American Express. We are proud to back this important program that aims to improve security in a scalable way and help support open source maintainers to implement secure software.","name":"Hilary Packer","jobTitle":"American Express - Chief Technology Officer","image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"29bci0dJUJWWsJjaSnHauc","type":"Asset","createdAt":"2024-11-19T16:59:54.133Z","updatedAt":"2024-11-19T16:59:54.133Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":1,"locale":"en-US"},"fields":{"title":"American Express logo","description":"American Express logo","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/29bci0dJUJWWsJjaSnHauc/1536cf4703dce76524a0f5c85d0a32c6/American_Express_logo__2018_.svg.png","details":{"size":55062,"image":{"width":1280,"height":1277}},"fileName":"American_Express_logo_(2018).svg.png","contentType":"image/png"}}}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7318eVndE9JB7N10LEFjJP","type":"Entry","createdAt":"2024-11-19T16:59:54.523Z","updatedAt":"2024-11-26T11:23:29.269Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentTestimonial"}},"locale":"en-US"},"fields":{"quote":"We see this program as an exciting win-win: getting money directly into the hands of FOSS developers, while enabling critical security improvements that benefit everyone.","name":"Dr. Kailash Nadh","jobTitle":"Zerodha - Chief Technology Officer","image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3RHPxjFXAC8ng2DSzx8111","type":"Asset","createdAt":"2024-11-19T16:59:54.135Z","updatedAt":"2024-11-19T16:59:54.135Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":1,"locale":"en-US"},"fields":{"title":"Zerodha logo","description":"Zerodha logo","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/3RHPxjFXAC8ng2DSzx8111/cbd8a9e41a939485706bd0f48dbfba10/1731695123-trimmy-1631331197142-removebg-preview.png","details":{"size":5553,"image":{"width":80,"height":80}},"fileName":"1731695123-trimmy-1631331197142-removebg-preview.png","contentType":"image/png"}}}}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"sLg66GLrnUdGH7uyaspd4","type":"Entry","createdAt":"2024-11-19T16:59:54.539Z","updatedAt":"2024-11-19T16:59:54.539Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionRivers"}},"locale":"en-US"},"fields":{"title":"/open-source-security-fund River - Ecosystem","rivers":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1zARtwz938UdDVal62r4bG","type":"Entry","createdAt":"2024-11-19T16:59:54.554Z","updatedAt":"2024-11-26T11:43:04.412Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":13,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentRiver"}},"locale":"en-US"},"fields":{"title":"/open-source-security-fund River - Ecosystem Partners","heading":"Ecosystem Partners","text":"Thank you to our Ecosystem Partners who are helping improve open source security. We are encouraged by the work of these organizations and communities shaping the ecosystem, providing valuable input, feedback, and ideas as we have brought this to life.","media":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1C5Akf7y4BeUW4hXXFDd3e","type":"Asset","createdAt":"2024-11-19T16:59:54.138Z","updatedAt":"2024-11-19T16:59:54.138Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":20,"revision":1,"locale":"en-US"},"fields":{"title":"Logos for OpenJS Sovereign Tech Agency Sustain OSS Mozilla Foundation OpenSSF Open Source Collective Ecosyste.ms OTF OSI CURIOSS LISH UCSC Open Forum Europe","description":"Logos for OpenJS Sovereign Tech Agency Sustain OSS Mozilla Foundation OpenSSF Open Source Collective Ecosyste.ms OTF OSI CURIOSS LISH UCSC Open Forum Europe","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/1C5Akf7y4BeUW4hXXFDd3e/e8fb4ece34d08af7f756f840705d31c4/logos.webp","details":{"size":146534,"image":{"width":1403,"height":867}},"fileName":"logos.webp","contentType":"image/webp"}}},"align":"start","imageTextRatio":"50:50"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7fdZDbJ6rWhfT3jq5gHqai","type":"Entry","createdAt":"2024-10-21T12:25:06.572Z","updatedAt":"2024-10-21T12:25:06.572Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionCtaBanner"}},"locale":"en-US"},"fields":{"title":"/open-source-security-fund CTA Banner","ctaBanner":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"GdrfJinW7kbiRsUgCspiU","type":"Entry","createdAt":"2024-10-21T12:25:06.588Z","updatedAt":"2024-11-26T10:55:26.382Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":28,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentCtaBanner"}},"locale":"en-US"},"fields":{"title":"/open-source-security-fund CTA Banner","heading":"Let's improve open source security for everyone","text":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Interested in improving open source security? We look forward to hearing from you","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"align":"center","hasBorder":true,"hasBackground":true,"hasShadow":false}}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7s6FFbrtY4bTpbv7WwB87V","type":"Entry","createdAt":"2024-10-21T12:31:31.028Z","updatedAt":"2024-11-26T10:45:41.791Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":23,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionFAQ"}},"locale":"en-US"},"fields":{"title":"/open-source-security-fund FAQ","sectionId":"faq","heading":"Frequently asked questions","faqBlocks":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4XBemycgrNnz2EeQBY6Fae","type":"Entry","createdAt":"2024-10-21T12:31:31.243Z","updatedAt":"2024-11-19T16:59:54.618Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentFAQBlock"}},"locale":"en-US"},"fields":{"title":"/open-source-security-fund FAQ 1","questions":[]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6EKN3lTojPccIFtmYEvMGv","type":"Entry","createdAt":"2024-11-19T16:59:55.152Z","updatedAt":"2024-11-19T16:59:55.152Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentFAQBlock"}},"locale":"en-US"},"fields":{"title":"/open-source-security-fund FAQ 2","questions":[]}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6PfkuHSH8pR7ncvZGzIibW","type":"Entry","createdAt":"2024-10-21T12:31:31.451Z","updatedAt":"2024-10-21T12:31:31.451Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionCards"}},"locale":"en-US"},"fields":{"title":"/open-source-security-fund Cards","cards":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7j3UUYCgvDaLADqoNiHGBf","type":"Entry","createdAt":"2024-10-21T12:31:31.467Z","updatedAt":"2024-10-21T12:31:31.467Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"layoutComponentCards"}},"locale":"en-US"},"fields":{"title":"/open-source-security-fund Cards","cards":[]}}}}]}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3YqGGANOSVthH94XgT5jpx","type":"Entry","createdAt":"2024-10-24T17:59:28.280Z","updatedAt":"2024-11-26T11:11:37.668Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":28,"revision":8,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{"metaTitle":"GitHub Secure Open Source Fund | Enhancing open source security","metaDescription":"Investing in open source security to mitigate risks and enhance software resilience. The GitHub Secure Open Source Fund helps secure fast-growing dependencies, providing maintainers with funding, expert guidance, and emergency support. Join the effort to scale security across the open source ecosystem.","metaImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3j5R457hG2dmhxmqtnwbKb","type":"Asset","createdAt":"2024-10-24T17:59:28.157Z","updatedAt":"2024-11-16T01:30:47.550Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":3,"locale":"en-US"},"fields":{"title":"SEO image for /open-source-security-fund","description":"This image features a dark background with three large, overlapping shapes in gradient-filled circle and square formations, positioned partially off-canvas from the top-right. In the foreground, there is text positioned from the top-left that reads \"GitHub Secure OSS Fund powered by GitHub Sponsors\".","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/3j5R457hG2dmhxmqtnwbKb/0b8c4a0dafb3f157e0105eea189ff1f9/Security_Sponsors_Page_Share_Graphic_2x__1_.png","details":{"size":12565236,"image":{"width":3840,"height":2160}},"fileName":"Security Sponsors Page Share Graphic@2x (1).png","contentType":"image/png"}}},"openGraphTitle":"GitHub Secure OSS Fund","openGraphDescription":"Invest in open source security and support maintainers with funding and expert guidance. Learn more about the program and its benefits."}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6pxXKKKDPAgHO6RN44qaQ","type":"Entry","createdAt":"2024-01-11T21:00:30.179Z","updatedAt":"2024-10-09T18:27:45.823Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":27,"revision":14,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"opensource","label":"Open Source"}}],"settings":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"ucLVFBVXDDwDQ4GdDBfXg","type":"Entry","createdAt":"2024-10-21T12:10:38.416Z","updatedAt":"2024-10-30T16:54:33.754Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"Page Settings for /open-source-security-fund","hasMinimalFooter":false,"isHidden":false,"revenuePlay":"Security"}}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2JXfWIen07qe3r5h6xfg4T","type":"Entry","createdAt":"2024-01-11T21:02:37.278Z","updatedAt":"2024-02-21T16:26:03.861Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/idc-marketscape","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2Kwmf6gvhhaqCweVAVSJbW","type":"Entry","createdAt":"2022-05-16T22:46:06.924Z","updatedAt":"2024-10-03T12:36:22.636Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":63,"revision":18,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"Resource Page for /idc-marketscape","path":"/idc-marketscape","title":"GitHub named a 'Major Player' in new IDC MarketScape","description":"Read the report excerpt for recent trends in application security testing and to learn more about why GitHub was named a Major Player.","body":"The new IDC MarketScape “Worldwide Application Security Testing, Code Analytics, and Software Composition Analysis 2022 Vendor Assessment” evaluates GitHub and other DevOps and DevSecOps providers.\n\nIDC’s assessment highlights several strengths of GitHub’s application security testing capabilities and approach, including our developer support and close integration with the GitHub platform, ease of workflow engagement, code scanning, secret scanning, software supply chain security, and partner integrations.","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Ulzs8brif3bYhmirjYHG","type":"Entry","createdAt":"2022-05-16T22:44:04.382Z","updatedAt":"2022-05-16T22:44:04.382Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"article"}},"locale":"en-US"},"fields":{"attachment":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7IOqawUyTrDxyzxWPyqxqP","type":"Asset","createdAt":"2022-05-16T22:43:57.073Z","updatedAt":"2022-05-16T22:43:57.073Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"locale":"en-US"},"fields":{"title":"/downloads/idc-marketscape.pdf","description":"idc-marketscape.pdf","file":{"url":"//assets.ctfassets.net/wfutmusr1t3h/7IOqawUyTrDxyzxWPyqxqP/51eaf0af1be76eeec3541e7c5fb36c27/idc-marketscape.pdf","details":{"size":245637},"fileName":"idc-marketscape.pdf","contentType":"application/pdf"}}}}},"gated":false,"sfCampaignID":"7015c000001SNN7AAO","campaign":"Resources_Contact_Us","contentForm":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3qHQ6eSp20iGQrFIfaBJnn","type":"Entry","createdAt":"2022-09-29T19:33:25.277Z","updatedAt":"2024-11-26T11:30:01.409Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":248,"revision":113,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"form"}},"locale":"en-US"},"fields":{"name":"Form_Ungated_Contact","title":"Wondering how GitHub can help your business?","subtitle":"Tell us more about your needs","eloquaFormName":"ContactUs_TemplateForm","formCTA":"Contact GitHub","formElements":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Euizanl72D7hjUPBu1cz4","type":"Entry","createdAt":"2023-04-04T12:27:44.815Z","updatedAt":"2024-11-26T11:37:30.225Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":372,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Last name","htmlName":"lastName","type":"text","placeholder":"Last name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6FMPEpNvfZnVg5o5pNdmAz","type":"Entry","createdAt":"2023-04-04T12:27:23.053Z","updatedAt":"2024-11-26T11:37:14.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":373,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"First name","htmlName":"firstName","type":"text","placeholder":"First name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6s0zB2lwQZz6ZhWkZQd5r0","type":"Entry","createdAt":"2022-09-29T18:54:51.900Z","updatedAt":"2024-11-26T11:36:43.185Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":234,"revision":112,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Work Email","htmlName":"emailAddress","type":"email","placeholder":"you@company.com","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3IumXBD9IQf1aCt2cTCoVh","type":"Entry","createdAt":"2023-06-23T19:25:51.253Z","updatedAt":"2024-11-26T11:36:56.805Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":212,"revision":105,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Phone","htmlName":"phone1","type":"tel","placeholder":"12 3456 7890","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5HOQnFx9120Wj4hlsjXaJn","type":"Entry","createdAt":"2022-03-12T20:19:03.843Z","updatedAt":"2024-11-26T11:37:58.388Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":374,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Company","htmlName":"company","type":"text","placeholder":"Acme, Inc","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1MS9X9RNVd6BmPN91fMsVg","type":"Entry","createdAt":"2022-09-29T19:31:39.832Z","updatedAt":"2024-11-26T11:37:05.764Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":209,"revision":104,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"What can we help you with?","htmlName":"contactComments","type":"textarea","placeholder":"Tell us how we can help. For support questions, head to github.com/contact ","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5zNCZ4hVsez1AWpp6Fga7h","type":"Entry","createdAt":"2022-03-12T20:23:32.191Z","updatedAt":"2024-11-20T14:58:44.487Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCustomerGUID","type":"hidden","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7a3HDjJcLkWmsPKHATLvna","type":"Entry","createdAt":"2022-03-12T20:24:00.556Z","updatedAt":"2024-11-20T14:58:44.527Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":18,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCookieWrite","type":"hidden","required":false,"defaultValue":"0"}}]}},"headerCTA":"Download PDF","buttonCTA":"Contact GitHub","publicationDate":"2022-05-16T00:00-07:00","hidden":false,"rendersRichText":false}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4eAz07eqOVt8Rqfvt3kSpv","type":"Entry","createdAt":"2022-05-16T22:35:39.532Z","updatedAt":"2024-10-03T13:02:37.724Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{"metaTitle":"GitHub named a ‘Major Player’ in new IDC MarketScape","metaDescription":"Download the report excerpt for recent trends in application security testing and to learn more about why GitHub was named a Major Player.","openGraphTitle":"GitHub named a ‘Major Player’ in new IDC MarketScape","openGraphDescription":"Download the report excerpt for recent trends in application security testing and to learn more about why GitHub was named a Major Player."}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5R9zfL5sHOvIqOX4WnG1mJ","type":"Entry","createdAt":"2024-01-11T21:00:30.758Z","updatedAt":"2024-11-26T10:53:17.315Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":85,"revision":44,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"github-advanced-security","label":"GitHub Advanced Security"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5E1TPh9dczhImOG9ZLP9HS","type":"Entry","createdAt":"2023-09-22T23:46:28.565Z","updatedAt":"2024-02-22T15:13:31.386Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/learn/pathways/security","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2bKDhdmEEiWyQ1pWpv23lC","type":"Entry","createdAt":"2023-09-22T23:41:45.383Z","updatedAt":"2023-09-22T23:41:45.383Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"containerLandingPage"}},"locale":"en-US"},"fields":{"title":"Landing Page for /learn/learning-pathways/security","sections":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"63MTChi1eKkSkzAtRwN472","type":"Entry","createdAt":"2023-09-22T23:41:33.429Z","updatedAt":"2023-09-22T23:41:33.429Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionHero"}},"locale":"en-US"},"fields":{"title":"/learn/learning-pathways/security Hero","hero":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4BnfDzGNwpTR1ykrG4fjzQ","type":"Entry","createdAt":"2023-09-22T23:41:38.181Z","updatedAt":"2024-10-09T18:40:11.520Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":32,"revision":12,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentHero"}},"locale":"en-US"},"fields":{"title":"/learn/learning-pathways/security Hero","heading":"Secure at every step","text":"Learn how industry experts use GitHub Advanced Security to protect their code without sacrificing developer productivity","align":"Left"}},"backgroundImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7f9pgRe8iwpqx089sDD7yU","type":"Asset","createdAt":"2023-09-22T23:41:29.005Z","updatedAt":"2023-09-22T23:41:29.005Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Security background","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/7f9pgRe8iwpqx089sDD7yU/e8a8b5c67a16c69195ce81de391c569f/Security_Thumbnail_Small_616x424px-2_1.png","details":{"size":45074,"image":{"width":616,"height":425}},"fileName":"Security_Thumbnail_Small_616x424px-2 1.png","contentType":"image/png"}}},"theme":"light"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3OERSjqDdah5bhFzEYKZvz","type":"Entry","createdAt":"2023-09-19T18:16:07.007Z","updatedAt":"2023-09-19T18:16:07.007Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionProse"}},"locale":"en-US"},"fields":{"internalTitle":"/learn/learning-pathways/security - Prose","prose":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2IKAn7ffAQKJtt3umHrKqQ","type":"Entry","createdAt":"2023-09-19T17:14:32.046Z","updatedAt":"2024-10-09T18:35:17.338Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":46,"revision":15,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentProse"}},"locale":"en-US"},"fields":{"internalTitle":"/learn/learning-pathways/security - Prose","text":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Get secure. Stay secure.","nodeType":"text"}],"nodeType":"heading-2"},{"data":{},"content":[{"data":{},"marks":[],"value":"\nSecurity is paramount for every organization today. But so is innovation. DevSecOps teams need tools that keep users safe without getting in developers' way and impacting time to market. Traditional security reviews can last for months, requiring developers to fix vulnerabilities in older code long after they've moved on to new projects, which disrupts their workflow and necessitates re-familiarizing themselves with past work. In other cases, security can feel like a barrier to getting things done, limiting the sorts of tools and libraries developers can bring to bear on a project. Plus, many security testing tools produce false positives that can block developers from committing their code, or condition them to ignore alerts.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"\n","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"GitHub Advanced Security (GHAS) makes shifting left easy. It empowers DevSecOps teams to prioritize innovation and developer productivity while ensuring that security isn’t sacrificed to meet feature delivery timelines. Automated security checks run with every pull request, empowering developers to remediate problems before pushing to production. By placing alerts and, in many cases, solutions right in the development workflow, security issues can be remediated in minutes, instead of months. Tests are highly curated to minimize the risk of false positives. Additionally, GHAS gives security teams visibility into the cross-organizational security posture and supply chain, and unparalleled access to curated security intelligence from millions of developers and security researchers around the world.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"\n","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"In these guides, DevSecOps veterans from leading companies share their insights and best practices for getting started with GHAS and tuning it to your organization’s specific needs.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Nick Liffen","nodeType":"text"},{"data":{},"marks":[],"value":" | ","nodeType":"text"},{"data":{"uri":"https://github.com/nickliffen"},"content":[{"data":{},"marks":[],"value":"@nickliffen","nodeType":"text"}],"nodeType":"hyperlink"},{"data":{},"marks":[],"value":" | Director of Field Services, Security, GitHub","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"}}}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3LjtOIYY3Ce3QyGUNWO4ce","type":"Entry","createdAt":"2023-09-22T16:28:18.125Z","updatedAt":"2023-09-22T16:28:18.125Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionLogos"}},"locale":"en-US"},"fields":{"title":"/learn/learning-pathways/security Logos","logos":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1dXKgspeKqDThwq9ErQefW","type":"Entry","createdAt":"2023-09-22T16:25:42.108Z","updatedAt":"2023-09-22T16:25:42.108Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentLogos"}},"locale":"en-US"},"fields":{"title":"/learn/learning-pathways/security Logos","logos":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5PU7nfURQqpTP3vPOP2T4o","type":"Asset","createdAt":"2023-06-23T19:25:51.046Z","updatedAt":"2023-06-23T19:25:51.046Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Telus logo","description":"Telus logo","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/5PU7nfURQqpTP3vPOP2T4o/26904203137763bab05798c6d7684fd1/Telus-Logo-trimmy.png","details":{"size":3091,"image":{"width":252,"height":48}},"fileName":"Telus-Logo-trimmy.png","contentType":"image/png"}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3KAaDSTu44C8lr0W3i3FVe","type":"Asset","createdAt":"2023-03-28T19:20:55.777Z","updatedAt":"2023-09-22T16:24:34.449Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":2,"locale":"en-US"},"fields":{"title":"LinkedIn logo","description":"LinkedIn logo","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/3KAaDSTu44C8lr0W3i3FVe/d1133032ec550e7248790467c5d14928/LI-Logo.png","details":{"size":25367,"image":{"width":2212,"height":540}},"fileName":"LI-Logo.png","contentType":"image/png"}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"h9s3PWlfFGIEOusEddrni","type":"Asset","createdAt":"2023-09-22T16:25:08.710Z","updatedAt":"2023-09-22T16:25:08.710Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"KPMG logo ","description":"KPMG logo","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/h9s3PWlfFGIEOusEddrni/dccbf63a47cf936d33a5cd06170f1644/KPMG-CMYK.png","details":{"size":66629,"image":{"width":3938,"height":1582}},"fileName":"KPMG-CMYK.png","contentType":"image/png"}}}]}}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2PoVxhGAenVbiTy204wzdb","type":"Entry","createdAt":"2023-09-22T23:41:21.605Z","updatedAt":"2023-09-22T23:41:21.605Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionRivers"}},"locale":"en-US"},"fields":{"title":"/learn/learning-pathways/security Rivers","rivers":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1YGCaaH0EvuFVOXWMS8eWC","type":"Entry","createdAt":"2023-09-22T23:41:00.120Z","updatedAt":"2024-10-09T18:13:31.079Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":32,"revision":12,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentRiver"}},"locale":"en-US"},"fields":{"title":"/learn/learning-pathways/security River - Essentials of GitHub Advanced Security","heading":"Essentials of GitHub Advanced Security","text":"Your security journey starts with a few clicks. Learn how to automate your application security testing and remediation with GitHub Advanced Security.","media":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2xDeRgVpaEOk10fSEsHc7a","type":"Asset","createdAt":"2023-09-22T23:40:51.158Z","updatedAt":"2023-09-22T23:40:51.158Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Guards guarding a castle","description":"Guards guarding a castle","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/2xDeRgVpaEOk10fSEsHc7a/57a0dc2e18d2620d36b7d84bea5d98fa/L100_HeroArt_Tim__1__1__5_.png","details":{"size":467732,"image":{"width":600,"height":360}},"fileName":"L100_HeroArt_Tim__1_ 1 (5).png","contentType":"image/png"}}},"align":"start","imageTextRatio":"50:50"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1Gie0NuP7brQKzvtsBor64","type":"Entry","createdAt":"2023-09-22T23:41:17.444Z","updatedAt":"2024-10-09T18:13:34.906Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":36,"revision":12,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentRiver"}},"locale":"en-US"},"fields":{"title":"/learn/learning-pathways/security River - Intermediate guides to GitHub Advanced Security","heading":"Intermediate guides to GitHub Advanced Security","text":"Build beyond the basics and configure GitHub Advanced Security to meet the specific needs of your organization with custom configurations, third-party integrations, and more.\n","media":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3W0otC0pmWXu4E69Ie93nc","type":"Asset","createdAt":"2023-09-22T23:41:08.424Z","updatedAt":"2023-09-22T23:41:08.424Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Cartoon rock climber using proper security techniques while climbing a rock wall","description":"Cartoon rock climber using proper security techniques while climbing a rock wall","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/3W0otC0pmWXu4E69Ie93nc/f46a34f077f1adac472339bb21f16530/L100_HeroArt_Tim__1__1__6_.png","details":{"size":556778,"image":{"width":600,"height":360}},"fileName":"L100_HeroArt_Tim__1_ 1 (6).png","contentType":"image/png"}}},"align":"end","imageTextRatio":"50:50"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5jI89jLmPywPwbcn5VGpbE","type":"Entry","createdAt":"2023-09-22T23:40:42.325Z","updatedAt":"2024-10-09T18:13:27.242Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":33,"revision":12,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentRiver"}},"locale":"en-US"},"fields":{"title":"/learn/learning-pathways/security River - Advanced guides to GitHub Advanced Security","heading":"Advanced guides to GitHub Advanced Security","text":"Dive into advanced functionality, such as central management, supply chain security testing configuration, and automated software-bill-of-materials generation.\n","media":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"547u8R29yNzeb7sBAOMqIL","type":"Asset","createdAt":"2023-09-22T23:40:33.232Z","updatedAt":"2023-09-22T23:40:33.232Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Three guards guarding art in a museum","description":"Three guards guarding art in a museum","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/547u8R29yNzeb7sBAOMqIL/b529a3f1b90ff7af9f584c87de882324/L100_HeroArt_Tim__1__1__1_.png","details":{"size":467135,"image":{"width":600,"height":360}},"fileName":"L100_HeroArt_Tim__1_ 1 (1).png","contentType":"image/png"}}},"align":"start","imageTextRatio":"50:50"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5lHlBL5nIsYNVxuEb9vPcY","type":"Entry","createdAt":"2023-09-22T23:40:21.582Z","updatedAt":"2024-08-05T16:25:21.559Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":66,"revision":32,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionTestimonials"}},"locale":"en-US"},"fields":{"title":"/learn/pathways/security - Quote","heading":"/learn/pathways/security - Quote","testimonials":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5WK6hJDpD9Ytlj9k8Ltx3G","type":"Entry","createdAt":"2023-09-22T23:40:18.569Z","updatedAt":"2024-10-09T15:34:21.192Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":85,"revision":36,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentTestimonial"}},"locale":"en-US"},"fields":{"quote":"It’s easy to add tools but never check the results. By pulling everything into one place, GitHub Advanced Security makes it easy to benefit from all our different tools.","name":"Phil Wright-Christie","jobTitle":"Lead DevOps Engineer // KPMG","image":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3UeWgAdeBB9vCLhzJ45qZn","type":"Asset","createdAt":"2023-09-22T22:40:20.821Z","updatedAt":"2023-09-22T22:40:20.821Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Phil Wright-Christie","description":"Phil Wright-Christie","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/3UeWgAdeBB9vCLhzJ45qZn/ccce707b14d2b44737cd0c347960bf86/Untitled_2__3_.png","details":{"size":7650,"image":{"width":100,"height":100}},"fileName":"Untitled 2 (3).png","contentType":"image/png"}}}}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"39ep37lL6Hrqn7hK1G8BTA","type":"Entry","createdAt":"2023-09-22T23:40:10.757Z","updatedAt":"2023-09-22T23:40:10.757Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionCtaBanner"}},"locale":"en-US"},"fields":{"title":"/learn/learning-pathways/security CTA banner","ctaBanner":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3BxZa8Pu4K0M08khU7uuIy","type":"Entry","createdAt":"2023-09-22T23:40:08.094Z","updatedAt":"2024-10-09T19:15:34.155Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":31,"revision":12,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentCtaBanner"}},"locale":"en-US"},"fields":{"title":"/learn/learning-pathways/security CTA banner","heading":"Shift left with a few clicks","text":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Learn how to unlock the power of GitHub Advanced Security to safeguard your code at every step of development.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"align":"center","hasBorder":true,"hasBackground":true,"hasShadow":true}}}}]}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2lYV9GuiZbin7s5GqCrMdp","type":"Entry","createdAt":"2023-09-26T13:21:37.665Z","updatedAt":"2023-09-26T13:21:37.665Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{"metaImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2c5pvD8RaUBtqrcEULhGV9","type":"Asset","createdAt":"2023-09-26T13:19:26.143Z","updatedAt":"2023-10-12T19:48:14.583Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":18,"revision":4,"locale":"en-US"},"fields":{"title":"SEO image","description":"GitHub logo Learning Pathways with swirling multicolored shapes","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/2c5pvD8RaUBtqrcEULhGV9/05d3a8abb0117edb962d6a5b0507b275/PrimaryLP_1200x630px_2x.png","details":{"size":2310407,"image":{"width":2400,"height":1261}},"fileName":"PrimaryLP_1200x630px@2x.png","contentType":"image/png"}}}}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2xGIwIaaRm8l4SerH8vrTw","type":"Entry","createdAt":"2023-08-24T13:15:40.373Z","updatedAt":"2024-02-21T16:26:01.216Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/open-source/secure-devops","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5zTPJzVOfIwfRDGyEYMDEE","type":"Entry","createdAt":"2022-03-13T22:40:36.992Z","updatedAt":"2024-10-17T17:51:06.076Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":69,"revision":26,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"Resource Page for /open-source/secure-devops","path":"/open-source/secure-devops","title":"Fireside Chat: Unleash the power of open source securely","description":"Open source software is the essential building block for any modern software project. Consuming open source securely and contributing back to the community have invaluable benefits at individual and organizational levels.\u003cbr\u003e\u003cbr\u003eJoin our fireside chat with IAG, Woolworths and GitHub experts as we discuss the pillars of a successful open source strategy including DevOps and security.","body":"\n\u003cdiv class=\"embed-responsive embed-responsive-16by9\"\u003e\n\u003ciframe src=\"https://player.vimeo.com/video/540754874\" width=\"640\" height=\"480\" frameborder=\"0\" webkitallowfullscreen mozallowfullscreen allowfullscreen\u003e\u003c/iframe\u003e\u003c/div\u003e","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"9IUtaToAvPXOIhMKgZNQf","type":"Entry","createdAt":"2022-03-15T21:30:35.652Z","updatedAt":"2022-03-15T21:31:05.637Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"video"}},"locale":"en-US"},"fields":{"speakers":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"DL9IxWSGzVJbeWXKjf6Pw","type":"Entry","createdAt":"2022-03-13T22:38:58.392Z","updatedAt":"2024-10-09T18:52:18.955Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":34,"revision":15,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Sam Hunt","title":"VP of APAC","company":"GitHub"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1CN5lzQ9XJ7Mxmj0e87k7j","type":"Entry","createdAt":"2022-03-13T22:39:10.428Z","updatedAt":"2024-10-09T18:52:21.369Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":34,"revision":15,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Kieran Clulow","title":"Director Data Engineering \u0026 Architecture","company":"IAG"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3OEzj38gsBRuymZjIgFwor","type":"Entry","createdAt":"2022-03-13T22:39:27.166Z","updatedAt":"2024-10-09T18:52:23.940Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":34,"revision":15,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Josh Rogers","title":"Head of Technology, Cloud \u0026 Platform Engineering","company":"Woolworths Group"}}],"dateRecorded":"2021-04-22T00:00-04:00","isWebcast":true}},"gated":false,"sfCampaignID":"7015c000001SNN7AAO","campaign":"Resources_Contact_Us","contentForm":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3qHQ6eSp20iGQrFIfaBJnn","type":"Entry","createdAt":"2022-09-29T19:33:25.277Z","updatedAt":"2024-11-26T11:30:01.409Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":248,"revision":113,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"form"}},"locale":"en-US"},"fields":{"name":"Form_Ungated_Contact","title":"Wondering how GitHub can help your business?","subtitle":"Tell us more about your needs","eloquaFormName":"ContactUs_TemplateForm","formCTA":"Contact GitHub","formElements":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Euizanl72D7hjUPBu1cz4","type":"Entry","createdAt":"2023-04-04T12:27:44.815Z","updatedAt":"2024-11-26T11:37:30.225Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":372,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Last name","htmlName":"lastName","type":"text","placeholder":"Last name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6FMPEpNvfZnVg5o5pNdmAz","type":"Entry","createdAt":"2023-04-04T12:27:23.053Z","updatedAt":"2024-11-26T11:37:14.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":373,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"First name","htmlName":"firstName","type":"text","placeholder":"First name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6s0zB2lwQZz6ZhWkZQd5r0","type":"Entry","createdAt":"2022-09-29T18:54:51.900Z","updatedAt":"2024-11-26T11:36:43.185Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":234,"revision":112,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Work Email","htmlName":"emailAddress","type":"email","placeholder":"you@company.com","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3IumXBD9IQf1aCt2cTCoVh","type":"Entry","createdAt":"2023-06-23T19:25:51.253Z","updatedAt":"2024-11-26T11:36:56.805Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":212,"revision":105,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Phone","htmlName":"phone1","type":"tel","placeholder":"12 3456 7890","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5HOQnFx9120Wj4hlsjXaJn","type":"Entry","createdAt":"2022-03-12T20:19:03.843Z","updatedAt":"2024-11-26T11:37:58.388Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":374,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Company","htmlName":"company","type":"text","placeholder":"Acme, Inc","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1MS9X9RNVd6BmPN91fMsVg","type":"Entry","createdAt":"2022-09-29T19:31:39.832Z","updatedAt":"2024-11-26T11:37:05.764Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":209,"revision":104,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"What can we help you with?","htmlName":"contactComments","type":"textarea","placeholder":"Tell us how we can help. For support questions, head to github.com/contact ","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5zNCZ4hVsez1AWpp6Fga7h","type":"Entry","createdAt":"2022-03-12T20:23:32.191Z","updatedAt":"2024-11-20T14:58:44.487Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCustomerGUID","type":"hidden","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7a3HDjJcLkWmsPKHATLvna","type":"Entry","createdAt":"2022-03-12T20:24:00.556Z","updatedAt":"2024-11-20T14:58:44.527Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":18,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCookieWrite","type":"hidden","required":false,"defaultValue":"0"}}]}},"publicationDate":"2021-04-22T00:00-05:00","hidden":false,"marketoCampaign":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2ywGzPlFH9kTdiOBF75ggA","type":"Entry","createdAt":"2023-09-15T23:09:46.917Z","updatedAt":"2024-11-20T14:58:44.542Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":7,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"marketoCampaign"}},"locale":"en-US"},"fields":{"title":"CO-GHG-CONTACT-FY23-10Oct-01-WW-Resources-Contact-Request/406214","cDLProgramName":"406214","source":"Contact Request","formFields":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6z2cGa4cuvoWqGxS3Ejhv4","type":"Entry","createdAt":"2023-09-12T16:31:47.760Z","updatedAt":"2024-11-26T11:32:18.468Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":127,"revision":59,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"sFDCLastCampaignStatus","htmlName":"sFDCLastCampaignStatus","type":"hidden","required":false,"defaultValue":"Responded"}}],"active":true}}}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2wIqX6eOT5vcNC3SfjcVOo","type":"Entry","createdAt":"2022-03-13T22:39:59.626Z","updatedAt":"2022-03-13T22:39:59.626Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2rym8Y8A56ngjMrr6oSlmh","type":"Entry","createdAt":"2024-01-11T21:00:35.775Z","updatedAt":"2024-11-26T10:53:25.505Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":194,"revision":98,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"devops","label":"DevOps"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6pxXKKKDPAgHO6RN44qaQ","type":"Entry","createdAt":"2024-01-11T21:00:30.179Z","updatedAt":"2024-10-09T18:27:45.823Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":27,"revision":14,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"opensource","label":"Open Source"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"26SDasmgzERmB60VHB8l7K","type":"Entry","createdAt":"2023-08-24T13:17:38.312Z","updatedAt":"2024-02-21T16:26:45.221Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/security/advanced-security-bites","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3iK5Zf9bMZ6Fmv7RWu7AwQ","type":"Entry","createdAt":"2022-09-01T14:55:47.541Z","updatedAt":"2024-10-03T12:37:29.150Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":187,"revision":34,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"Resource Page for /security/advanced-security-bites","path":"/security/advanced-security-bites","title":"Appsec Talk - Hashicorp","description":"\nHow Hashicorp secures their code\n","body":"## Securing your code doesn’t have to be cumbersome\n\nWatch Hashicorp’s director of product security, Jamie Finnegan, and GitHub’s code scanning architect, Keith Hoodlet, discuss how Hashicorp started using GitHub Advanced Security and why they find it helpful. Join the full conversation [here](https://infocus.github.com/sessions/insights-from-hashicorp-securing-the-software-they-ship/)\n\n\u003cdiv class=\"embed-responsive embed-responsive-16by9\"\u003e\u003ciframe src=\"https://player.vimeo.com/video/757179855?h=8a7a8b0eee\u0026title=0\u0026byline=0\u0026portrait=0\u0026speed=0\u0026badge=0\u0026autopause=0\u0026player_id=0\u0026app_id=58479/embed\" allow=\"autoplay; fullscreen; picture-in-picture\" allowfullscreen frameborder=\"0\"\u003e\u003c/iframe\u003e\u003c/div\u003e\n","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"33sHeO4iDpT4FkSFXk6apG","type":"Entry","createdAt":"2022-03-12T02:28:56.479Z","updatedAt":"2022-03-13T22:05:45.099Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"video"}},"locale":"en-US"},"fields":{"dateRecorded":"2020-08-27T00:00-08:00","isWebcast":true}},"gated":false,"sfCampaignID":"7015c000001SNN7AAO","campaign":"Resources_Contact_Us","contentForm":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3qHQ6eSp20iGQrFIfaBJnn","type":"Entry","createdAt":"2022-09-29T19:33:25.277Z","updatedAt":"2024-11-26T11:30:01.409Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":248,"revision":113,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"form"}},"locale":"en-US"},"fields":{"name":"Form_Ungated_Contact","title":"Wondering how GitHub can help your business?","subtitle":"Tell us more about your needs","eloquaFormName":"ContactUs_TemplateForm","formCTA":"Contact GitHub","formElements":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Euizanl72D7hjUPBu1cz4","type":"Entry","createdAt":"2023-04-04T12:27:44.815Z","updatedAt":"2024-11-26T11:37:30.225Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":372,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Last name","htmlName":"lastName","type":"text","placeholder":"Last name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6FMPEpNvfZnVg5o5pNdmAz","type":"Entry","createdAt":"2023-04-04T12:27:23.053Z","updatedAt":"2024-11-26T11:37:14.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":373,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"First name","htmlName":"firstName","type":"text","placeholder":"First name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6s0zB2lwQZz6ZhWkZQd5r0","type":"Entry","createdAt":"2022-09-29T18:54:51.900Z","updatedAt":"2024-11-26T11:36:43.185Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":234,"revision":112,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Work Email","htmlName":"emailAddress","type":"email","placeholder":"you@company.com","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3IumXBD9IQf1aCt2cTCoVh","type":"Entry","createdAt":"2023-06-23T19:25:51.253Z","updatedAt":"2024-11-26T11:36:56.805Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":212,"revision":105,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Phone","htmlName":"phone1","type":"tel","placeholder":"12 3456 7890","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5HOQnFx9120Wj4hlsjXaJn","type":"Entry","createdAt":"2022-03-12T20:19:03.843Z","updatedAt":"2024-11-26T11:37:58.388Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":374,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Company","htmlName":"company","type":"text","placeholder":"Acme, Inc","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1MS9X9RNVd6BmPN91fMsVg","type":"Entry","createdAt":"2022-09-29T19:31:39.832Z","updatedAt":"2024-11-26T11:37:05.764Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":209,"revision":104,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"What can we help you with?","htmlName":"contactComments","type":"textarea","placeholder":"Tell us how we can help. For support questions, head to github.com/contact ","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5zNCZ4hVsez1AWpp6Fga7h","type":"Entry","createdAt":"2022-03-12T20:23:32.191Z","updatedAt":"2024-11-20T14:58:44.487Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCustomerGUID","type":"hidden","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7a3HDjJcLkWmsPKHATLvna","type":"Entry","createdAt":"2022-03-12T20:24:00.556Z","updatedAt":"2024-11-20T14:58:44.527Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":18,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCookieWrite","type":"hidden","required":false,"defaultValue":"0"}}]}},"headerImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6zwk8uklFCQ2qeCWfCFiug","type":"Asset","createdAt":"2022-11-22T21:11:38.392Z","updatedAt":"2024-03-19T11:06:41.098Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":4,"locale":"en-US"},"fields":{"title":"Security - Dark 3","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png","details":{"size":94954,"image":{"width":1200,"height":630}},"fileName":"Security-DarkMode-3 1.png","contentType":"image/png"}}},"buttonCTA":"Contact GitHub","publicationDate":"2022-08-17T00:00-08:00","hidden":false,"rendersRichText":false,"marketoCampaign":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2ywGzPlFH9kTdiOBF75ggA","type":"Entry","createdAt":"2023-09-15T23:09:46.917Z","updatedAt":"2024-11-20T14:58:44.542Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":7,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"marketoCampaign"}},"locale":"en-US"},"fields":{"title":"CO-GHG-CONTACT-FY23-10Oct-01-WW-Resources-Contact-Request/406214","cDLProgramName":"406214","source":"Contact Request","formFields":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6z2cGa4cuvoWqGxS3Ejhv4","type":"Entry","createdAt":"2023-09-12T16:31:47.760Z","updatedAt":"2024-11-26T11:32:18.468Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":127,"revision":59,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"sFDCLastCampaignStatus","htmlName":"sFDCLastCampaignStatus","type":"hidden","required":false,"defaultValue":"Responded"}}],"active":true}}}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7rtXrg8vAsn6lhmzEq1WKp","type":"Entry","createdAt":"2022-03-12T02:30:20.156Z","updatedAt":"2024-10-03T13:03:41.807Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":6,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{"metaTitle":"Shipping fast with a secure supply chain on GitHub","metaDescription":"Following DevSecOps means approaching security as an ongoing part of software development—and staying up to date on the code your software depends on.","openGraphTitle":"Shipping fast with a secure supply chain on GitHub","openGraphDescription":"Following DevSecOps means approaching security as an ongoing part of software development—and staying up to date on the code your software depends on."}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5R9zfL5sHOvIqOX4WnG1mJ","type":"Entry","createdAt":"2024-01-11T21:00:30.758Z","updatedAt":"2024-11-26T10:53:17.315Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":85,"revision":44,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"github-advanced-security","label":"GitHub Advanced Security"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7ApUF6cudIWC7QgOYnINIG","type":"Entry","createdAt":"2024-03-20T17:40:57.529Z","updatedAt":"2024-04-30T10:59:08.462Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/security/ai-powered-devsecops-checklist","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"erITUxPJNjQ4AZld08iyg","type":"Entry","createdAt":"2024-03-20T17:40:57.717Z","updatedAt":"2024-10-03T12:42:34.303Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":31,"revision":9,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"Resource Page for /security/ai-powered-devsecops-checklist","title":"A checklist for AI-powered DevSecOps","description":"Simply bolting security tools onto a developer’s workflow can create friction, and make it difficult to detect and remediate vulnerabilities. Here’s where AI can help. In this checklist, we’ll show you where and how to integrate AI and automation into your software supply chain.","body":"What’s inside:\n- A checklist for safeguarding your entire software supply chain—from reviewing and implementing platform security fundamentals to protecting your codebase and build system\n- Tips and resources for integrating AI and automation at specific steps in the software supply chain \n\nPowering DevSecOps with AI and automation can help prevent developers from writing vulnerable code in the first place, generate secure code suggestions that developers can test and refine, and provide context around potential vulnerabilities—all within the developer’s typical workflow. As a result, organizations can save costs by catching and fixing vulnerabilities in the development process rather than in production or after release. ","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6IcjtHL4pT956mtEkhED0L","type":"Entry","createdAt":"2024-03-20T17:40:57.834Z","updatedAt":"2024-04-01T14:33:46.629Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"article"}},"locale":"en-US"},"fields":{"attachment":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1FxsSfmLnx2tlXFhlmu3tR","type":"Asset","createdAt":"2024-04-01T14:33:46.506Z","updatedAt":"2024-04-01T14:33:46.506Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"A checklist for AI-powered DevSecOps ebook","description":"A checklist for AI-powered DevSecOps ebook","file":{"url":"//assets.ctfassets.net/wfutmusr1t3h/1FxsSfmLnx2tlXFhlmu3tR/765e2848ab29c2ca06fde1160be2206c/Github-DevSecOps-ebook-AChecklistForAI.pdf","details":{"size":4072734},"fileName":"Github-DevSecOps-ebook-AChecklistForAI.pdf","contentType":"application/pdf"}}}}},"gated":true,"sfCampaignID":"7015c000001ijziAAA","campaign":"2024q3-site-www-eBook-Checklist AI-powered DevSecOps","contentForm":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5HEE5E2SRHcnBLFVf6DBmq","type":"Entry","createdAt":"2024-03-20T17:41:49.503Z","updatedAt":"2024-10-03T13:08:48.768Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"form"}},"locale":"en-US"},"fields":{"name":"Form_Gated_PDF \"Get the checklist\"","title":"Get the checklist","subtitle":"Tell us a bit about you.","eloquaFormName":"ContentReg_TemplateForm","formCTA":"Download PDF","formElements":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6FMPEpNvfZnVg5o5pNdmAz","type":"Entry","createdAt":"2023-04-04T12:27:23.053Z","updatedAt":"2024-11-26T11:37:14.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":373,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"First name","htmlName":"firstName","type":"text","placeholder":"First name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Euizanl72D7hjUPBu1cz4","type":"Entry","createdAt":"2023-04-04T12:27:44.815Z","updatedAt":"2024-11-26T11:37:30.225Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":372,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Last name","htmlName":"lastName","type":"text","placeholder":"Last name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6s0zB2lwQZz6ZhWkZQd5r0","type":"Entry","createdAt":"2022-09-29T18:54:51.900Z","updatedAt":"2024-11-26T11:36:43.185Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":234,"revision":112,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Work Email","htmlName":"emailAddress","type":"email","placeholder":"you@company.com","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5zNCZ4hVsez1AWpp6Fga7h","type":"Entry","createdAt":"2022-03-12T20:23:32.191Z","updatedAt":"2024-11-20T14:58:44.487Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCustomerGUID","type":"hidden","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7a3HDjJcLkWmsPKHATLvna","type":"Entry","createdAt":"2022-03-12T20:24:00.556Z","updatedAt":"2024-11-20T14:58:44.527Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":18,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCookieWrite","type":"hidden","required":false,"defaultValue":"0"}}]}},"headerImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3brGEQk2zC0BIWfpZFFQI3","type":"Asset","createdAt":"2023-03-17T14:57:28.918Z","updatedAt":"2024-03-19T11:06:10.013Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":5,"locale":"en-US"},"fields":{"title":"Security - Dark 1","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/3brGEQk2zC0BIWfpZFFQI3/368db18eb3764b08fe0e24005f513881/Security-DarkMode-1_1.png","details":{"size":93322,"image":{"width":1200,"height":630}},"fileName":"Security-DarkMode-1 1.png","contentType":"image/png"}}},"headerCTA":"Get the checklist","publicationDate":"2024-04-30T00:00","hidden":false,"rendersRichText":false,"marketoCampaign":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1OnXpS1fRVKybhEoKUh3fl","type":"Entry","createdAt":"2024-03-25T23:23:40.968Z","updatedAt":"2024-03-25T23:25:03.586Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"marketoCampaign"}},"locale":"en-US"},"fields":{"title":"CDL: 433173","cDLProgramName":"433173","source":"Content","formFields":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1MeLypt5r1ETuhuWdQR3Ij","type":"Entry","createdAt":"2023-08-29T15:37:47.180Z","updatedAt":"2024-11-26T11:38:22.547Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":85,"revision":37,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"sFDCLastCampaignStatus","type":"hidden","required":false,"defaultValue":"Responded","description":"Salesforce last campaign status value of \"Responded\""}}],"active":true}}}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1hjwkc00NQCZawueNcVl8w","type":"Entry","createdAt":"2024-01-11T21:02:52.054Z","updatedAt":"2024-02-21T16:25:50.060Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/security/application-security-guide (testing template)","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4cEsoAt1qZfGV7TcHOQuK6","type":"Entry","createdAt":"2024-05-07T16:35:07.462Z","updatedAt":"2024-10-03T12:38:50.314Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":20,"revision":4,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"Resource Page for /security/application-security-guide (testing template)","path":"/security/application-security-guide (testing template)","title":"Application Security explained: Downloadable guide to learn how to put the developer first","description":"Put developers front and center for application security and drive down the number of vulnerabilities in production code. Download this PDF guide to learn more.","body":"Unless security issues can be identified and fixed by your\ndevelopers early in the development lifecycle, technical debt will\ncontinue to be a challenge for your software ecosystem. And like\nmany other challenges, application security problems are easiest\nand most cost-effective to solve at the source. To actually drive\ndown the number of vulnerabilities in![GHAS ebook ](//images.ctfassets.net/wfutmusr1t3h/9VCMFwy9QQhqF7Cv7NXW0/2d3953ae0eba2f6299bef268d23b951c/Screen_Shot_2022-08-01_at_3.45.06_PM.png) \n\n**Download the PDF to keep reading →**","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5nQXmyurhWfTrobWPw7suT","type":"Entry","createdAt":"2022-03-14T01:32:14.729Z","updatedAt":"2022-08-04T20:27:18.198Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"article"}},"locale":"en-US"},"fields":{}},"gated":true,"sfCampaignID":"7013o000002fCFO","campaign":"Advanced Security eBook","contentForm":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"pmnVmHkijaZ30Z2I2hA7J","type":"Entry","createdAt":"2022-03-12T20:28:08.930Z","updatedAt":"2024-11-26T11:29:32.028Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":112,"revision":45,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"form"}},"locale":"en-US"},"fields":{"name":"form-content-reg","title":"Wondering how GitHub can help your business?","subtitle":"Tell us more about your needs","eloquaFormName":"ContentReg_TemplateForm","formElements":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6FMPEpNvfZnVg5o5pNdmAz","type":"Entry","createdAt":"2023-04-04T12:27:23.053Z","updatedAt":"2024-11-26T11:37:14.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":373,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"First name","htmlName":"firstName","type":"text","placeholder":"First name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Euizanl72D7hjUPBu1cz4","type":"Entry","createdAt":"2023-04-04T12:27:44.815Z","updatedAt":"2024-11-26T11:37:30.225Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":372,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Last name","htmlName":"lastName","type":"text","placeholder":"Last name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1oc1nNacqE77XQSuJXaNdl","type":"Entry","createdAt":"2022-03-12T20:17:06.911Z","updatedAt":"2024-11-26T11:37:42.078Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":281,"revision":138,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Work Email Address","htmlName":"emailAddress","type":"email","placeholder":"you@example.com","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"40sP3SIDeLJIKo7gAvmAdv","type":"Entry","createdAt":"2022-03-12T20:30:16.766Z","updatedAt":"2024-11-26T11:37:50.340Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":264,"revision":130,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Job Title","htmlName":"title","type":"text","placeholder":"Job Title","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5HOQnFx9120Wj4hlsjXaJn","type":"Entry","createdAt":"2022-03-12T20:19:03.843Z","updatedAt":"2024-11-26T11:37:58.388Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":374,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Company","htmlName":"company","type":"text","placeholder":"Acme, Inc","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5zNCZ4hVsez1AWpp6Fga7h","type":"Entry","createdAt":"2022-03-12T20:23:32.191Z","updatedAt":"2024-11-20T14:58:44.487Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCustomerGUID","type":"hidden","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7a3HDjJcLkWmsPKHATLvna","type":"Entry","createdAt":"2022-03-12T20:24:00.556Z","updatedAt":"2024-11-20T14:58:44.527Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":18,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCookieWrite","type":"hidden","required":false,"defaultValue":"0"}}]}},"publicationDate":"2020-07-21T00:00-05:00","hidden":false,"rendersRichText":false}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3E3mTNRyEglzhc7Zp23q72","type":"Entry","createdAt":"2022-03-14T01:31:27.307Z","updatedAt":"2024-10-03T13:04:11.421Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":6,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{"metaTitle":"Application Security explained: Downloadable guide to learn how to put the developer first","metaDescription":"Put developers front and center for application security and drive down the number of vulnerabilities in production code. Download this PDF guide to learn more.","openGraphTitle":"Application Security explained: Downloadable guide to learn how to put the developer first","openGraphDescription":"Put developers front and center for application security and drive down the number of vulnerabilities in production code. Download this PDF guide to learn more."}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2RzvOCWQuJIBnlRvEeSvnt","type":"Entry","createdAt":"2024-03-22T14:22:33.720Z","updatedAt":"2024-04-16T18:11:05.511Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":4,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/security/application-security-testing","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7E5UnOcrMfQbHwxOsDJ7Ee","type":"Entry","createdAt":"2024-03-22T14:22:33.824Z","updatedAt":"2024-03-22T14:22:33.824Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"containerLandingPage"}},"locale":"en-US"},"fields":{"title":"/security/application-security-testing","sections":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7xZr5zM68EZXYmfII0kScO","type":"Entry","createdAt":"2024-03-22T14:22:33.860Z","updatedAt":"2024-03-22T14:22:33.860Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionHero"}},"locale":"en-US"},"fields":{"title":"/security/application-security-testing Hero","hero":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5v18EBpcHkhaugrdw9L2OR","type":"Entry","createdAt":"2024-03-22T14:22:33.891Z","updatedAt":"2024-10-09T16:20:19.167Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":8,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentHero"}},"locale":"en-US"},"fields":{"title":"/security/application-security-testing Hero","heading":"Application security testing","text":"Application security testing (AST) is the process of making applications more resilient to security threats by evaluating the application to identify potential vulnerabilities that can be exploited. Although organizations have invested billions of dollars into application security, web applications are still vulnerable to a range of cyberattacks. To keep software safe, it’s important to use application security testing tools.\n\n","align":"Left"}},"backgroundImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6zwk8uklFCQ2qeCWfCFiug","type":"Asset","createdAt":"2022-11-22T21:11:38.392Z","updatedAt":"2024-03-19T11:06:41.098Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":4,"locale":"en-US"},"fields":{"title":"Security - Dark 3","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png","details":{"size":94954,"image":{"width":1200,"height":630}},"fileName":"Security-DarkMode-3 1.png","contentType":"image/png"}}},"theme":"dark"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"MWMzpqlN6gRKxOcgVlvfp","type":"Entry","createdAt":"2024-03-22T14:22:33.911Z","updatedAt":"2024-03-22T14:22:33.911Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentAnchorNav"}},"locale":"en-US"},"fields":{"title":"/security/application-security-testing Nav","links":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"13VjH3zCjCrSqNl1aOYuYg","type":"Entry","createdAt":"2024-03-13T16:27:09.199Z","updatedAt":"2024-10-09T18:20:03.374Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":22,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"anchorLink"}},"locale":"en-US"},"fields":{"title":"Benefits","text":"Benefits","href":"benefits"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"30WL8NGzdrA7KATIF7S3II","type":"Entry","createdAt":"2024-03-13T16:23:11.261Z","updatedAt":"2024-10-09T18:19:58.040Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":21,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"anchorLink"}},"locale":"en-US"},"fields":{"title":"Tools","text":"Tools","href":"tools"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3m3tOEiWJtjdCUDdGUKG0k","type":"Entry","createdAt":"2024-03-22T14:22:33.945Z","updatedAt":"2024-10-09T18:20:54.482Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":21,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"anchorLink"}},"locale":"en-US"},"fields":{"title":"How to choose","text":"How to choose","href":"how-to-choose"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7djgr9ry1JbxZNsS588VtP","type":"Entry","createdAt":"2024-03-22T14:22:34.043Z","updatedAt":"2024-10-09T18:20:57.289Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":20,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"anchorLink"}},"locale":"en-US"},"fields":{"title":"Conclusion","text":"Conclusion","href":"conclusion"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6JBpSa6kNeCj0NEnMK6QIU","type":"Entry","createdAt":"2023-03-31T02:17:35.715Z","updatedAt":"2024-10-09T18:22:09.372Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":30,"revision":12,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"anchorLink"}},"locale":"en-US"},"fields":{"title":"FAQs","text":"FAQs","href":"faqs"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3T56rDxK1DBZ9DHlaZmxc5","type":"Entry","createdAt":"2024-03-22T14:22:34.124Z","updatedAt":"2024-03-22T14:22:34.124Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionProse"}},"locale":"en-US"},"fields":{"internalTitle":"/security/application-security-testing Prose - benefits","sectionId":"benefits","prose":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4gFhuwBvQ7pWKc8pfnvmpW","type":"Entry","createdAt":"2024-03-22T14:22:34.145Z","updatedAt":"2024-10-09T18:32:51.494Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":21,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentProse"}},"locale":"en-US"},"fields":{"internalTitle":"/security/application-security-testing Prose - benefits","text":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Benefits of application security testing","nodeType":"text"}],"nodeType":"heading-2"},{"data":{},"content":[{"data":{},"marks":[],"value":"Application security testing is an essential part of the software development lifecycle (SDLC) because it helps identify security weaknesses and vulnerabilities in source code. Implementing application security testing into your SDLC provides several benefits, including:","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Improved security and software quality.","nodeType":"text"},{"data":{},"marks":[],"value":" Application security testing helps developers identify and fix security concerns at the development stage—before the software ships to production. After the application launches, application security testing continues to identify vulnerabilities so developers can quickly remediate them.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Protection of sensitive data.","nodeType":"text"},{"data":{},"marks":[],"value":"** By safeguarding private information and finding errors that might expose sensitive data, application security testing helps developers get ahead of bad actors. This is business critical for companies that handle sensitive data, such as credit card and bank account numbers, personal data, and customer records.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Reduced risk of a security breach.","nodeType":"text"},{"data":{},"marks":[],"value":" A single data breach can cost millions of dollars, including remediation, legal fees, victim assistance, ransomware paid to hackers, and penalties imposed by state and local governments. In some cases, organizations might need to slow down or halt their business operations and revenue generation until the security issues are resolved. Application security testing helps prevent data breaches from taking place—by ensuring that all the barriers are in place to keep malicious hackers from exploiting vulnerabilities.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Enhanced compliance.","nodeType":"text"},{"data":{},"marks":[],"value":" Application security testing helps organizations stay compliant with data protection laws by using the most current security protections available.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Increased productivity.","nodeType":"text"},{"data":{},"marks":[],"value":" By minimizing the time it takes to remediate security issues, applications security testing gives developers more time to do their jobs—which is building applications.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"}],"nodeType":"unordered-list"},{"data":{},"content":[{"data":{},"marks":[],"value":"To keep software safe from the threat of bad actors that are only growing more sophisticated over time, it’s pivotal to integrate application security testing into your software development lifecycle. You’ll empower your developers to build highly secure applications faster and more efficiently and help protect your organization from costly data breaches.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"\n","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"}}}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4F3xNPdiGZu4zd5vrBmQX6","type":"Entry","createdAt":"2024-03-22T14:22:34.164Z","updatedAt":"2024-03-22T14:22:34.164Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionProse"}},"locale":"en-US"},"fields":{"internalTitle":"/security/application-security-testing Prose - tools","sectionId":"tools","prose":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"68CGGORIDJmSjtqKWJvaSH","type":"Entry","createdAt":"2024-03-22T14:22:34.185Z","updatedAt":"2024-10-09T18:32:54.747Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":23,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentProse"}},"locale":"en-US"},"fields":{"internalTitle":"/security/application-security-testing Prose - tools","text":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Application security testing tools","nodeType":"text"}],"nodeType":"heading-2"},{"data":{},"content":[{"data":{},"marks":[],"value":"Depending on their needs, most organizations use a combination of application security testing tools, including:","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Static application security testing (SAST) ","nodeType":"text"},{"data":{},"marks":[],"value":"scans binary code or application source code when the application is not running to find vulnerabilities based on design or implementation.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Dynamic application security testing (DAST) ","nodeType":"text"},{"data":{},"marks":[],"value":"tests running web applications for security issues by mimicking the same techniques that malicious attackers use to find application vulnerabilities.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Interactive application security testing (IAST) ","nodeType":"text"},{"data":{},"marks":[],"value":"includes dynamic and interactive testing. It uses actual inputs and actions in a controlled manner to probe the application under test.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Mobile application security testing (MAST) ","nodeType":"text"},{"data":{},"marks":[],"value":"addresses mobile-specific issues like data leaks from mobile devices and jailbreaking, in addition to typical security vulnerabilities.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Software composition analysis (SCA) ","nodeType":"text"},{"data":{},"marks":[],"value":"inventories open source and third-party commercial components used within an application, identifies security vulnerabilities within those components, and provides ways to remediate the issues.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Runtime application self-protection (RASP) ","nodeType":"text"},{"data":{},"marks":[],"value":"analyzes user behavior and application traffic at runtime to identify and prevent cyber threats.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"}],"nodeType":"unordered-list"},{"data":{},"content":[{"data":{},"marks":[],"value":"","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"}}}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2QIdi8nyw1kbofWeMbX5zf","type":"Entry","createdAt":"2024-03-22T14:19:37.932Z","updatedAt":"2024-03-22T14:19:37.932Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionRivers"}},"locale":"en-US"},"fields":{"title":"SEO River - interrupt - Security at every step","rivers":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6cg4LOHwTiQv5VQk5zmJVN","type":"Entry","createdAt":"2024-03-22T14:19:37.992Z","updatedAt":"2024-10-09T15:25:58.717Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":8,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentRiver"}},"locale":"en-US"},"fields":{"title":"SEO River - interrupt - Security at every step","heading":"Security at every step","text":"Find and fix vulnerabilities swiftly with GitHub Advanced Security, ensuring fast remediation rates and seamless integration into your workflow.","media":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6zwk8uklFCQ2qeCWfCFiug","type":"Asset","createdAt":"2022-11-22T21:11:38.392Z","updatedAt":"2024-03-19T11:06:41.098Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":4,"locale":"en-US"},"fields":{"title":"Security - Dark 3","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png","details":{"size":94954,"image":{"width":1200,"height":630}},"fileName":"Security-DarkMode-3 1.png","contentType":"image/png"}}},"align":"end","imageTextRatio":"50:50"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"38r29ABfO25bzsdr4Dr8Ve","type":"Entry","createdAt":"2024-03-22T14:22:34.205Z","updatedAt":"2024-03-22T14:22:34.205Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionProse"}},"locale":"en-US"},"fields":{"internalTitle":"/security/application-security-testing Prose - how-to-choose","sectionId":"how-to-choose","prose":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7fuqS15jdok6HBFt2xhNiM","type":"Entry","createdAt":"2024-03-22T14:22:34.279Z","updatedAt":"2024-10-09T18:32:58.096Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":26,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentProse"}},"locale":"en-US"},"fields":{"internalTitle":"/security/application-security-testing Prose - how-to-choose","text":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Selecting the right application security testing tool","nodeType":"text"}],"nodeType":"heading-2"},{"data":{},"content":[{"data":{},"marks":[],"value":"The following best practices are designed to help you choose the best application security testing tool for your needs and effectively integrate it into your development workflow to quickly find and fix vulnerabilities.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Identify your requirements and goals.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"It’s important to choose an application security testing tool that scans for the specific vulnerabilities in your application and performs reviews in the appropriate programming languages for your project.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"For example, you might want to get started with a SAST tool if you have access to the application’s source code, or a DAST tool if the application was delivered to your team as an executable. If the application uses open source and third-party commercial components, then an SCA tool might be the most effective choice. Also, remember that developer teams typically use a combination of application security testing tools to meet their needs.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Research and compare application security testing tools.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"Speed and accuracy are two key requirements. The application security testing tool must fit into your team’s delivery schedule and provide accurate results. If it takes too long to scan code, or if it delivers too many false positives that your developers need to triage, it will cause costly delivery delays.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"Before you choose your application security testing tool, be sure to engage with the vendor, participate in a demo, and try it for free. Of course, the price needs to fit within your budget.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Plan the implementation process.","nodeType":"text"},{"data":{},"marks":[],"value":" ","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"Consider the following steps:","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Deploy. ","nodeType":"text"},{"data":{},"marks":[],"value":"Set up the licensing requirements, required control and authorization access, and procure the resources needed to get the tool up and running.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Customize. ","nodeType":"text"},{"data":{},"marks":[],"value":"Tailor the tool to fit the needs of your organization. You can configure it to reduce false positives, for example, or write new rules so it finds additional vulnerabilities.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Integrate applications. ","nodeType":"text"},{"data":{},"marks":[],"value":"Onboard your applications and make sure regular scans of apps are synced with their release cycles, builds, or code check-ins.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Run early and small. ","nodeType":"text"},{"data":{},"marks":[],"value":"Focus on running scans early in the development process and for small scopes. Expand the scope as you go.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Analyze your scan results. ","nodeType":"text"},{"data":{},"marks":[],"value":"When issues are finalized, track and provide them to the deployment teams for timely remediation.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Provide training. ","nodeType":"text"},{"data":{},"marks":[],"value":"Your vendor should provide security awareness training, so developers know how to spot signs of attacks. Plus, your tool should have easy-to-follow tutorials, online training, and documentation.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"}],"nodeType":"unordered-list"},{"data":{},"content":[{"data":{},"marks":[],"value":"","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"}}}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6WMdooclofZwhCNAfkJsSc","type":"Entry","createdAt":"2024-03-22T14:22:34.302Z","updatedAt":"2024-03-22T14:22:34.302Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionProse"}},"locale":"en-US"},"fields":{"internalTitle":"/security/application-security-testing Prose - conclusion","sectionId":"conclusion","prose":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5yJkenm2jdZ4OjwTD9UESg","type":"Entry","createdAt":"2024-03-22T14:22:34.321Z","updatedAt":"2024-10-09T18:28:05.802Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":22,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentProse"}},"locale":"en-US"},"fields":{"internalTitle":"/security/application-security-testing Prose - conclusion","text":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Conclusion: secure every step","nodeType":"text"}],"nodeType":"heading-2"},{"data":{},"content":[{"data":{},"marks":[],"value":"A better SAST tool is one that is integrated into the developer workflow and allows developers to address vulnerabilities in real time. It’s also context-rich, so developers of all security backgrounds can fix the vulnerabilities discovered.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"That’s where GitHub’s native SAST tool, code scanning, comes in. As a feature of GitHub Advanced Security (GHAS), this developer-empowering approach takes in source code and examines it for known vulnerable patterns—such as buffer overflows, SQL injection, and cross-site scripting—as it’s being written. The tool then shares the output directly into the developer workflow, allowing developers to integrate fixes natively. It also provides comprehensive information on each vulnerability, including the severity and risk level, as well as suggestions on how to fix it. This makes it simple to secure code before it ever reaches production.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"With always-on protection, GHAS continually monitors code and surfaces findings immediately, while allowing developers to automatically test their code at every git push. This allows them to see security issues in their pull requests as part of the code review process and prevents security issues from ever making it into the main branch.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"Along with code scanning developers use ","nodeType":"text"},{"data":{"uri":"https://docs.github.com/en/code-security/secret-scanning/about-secret-scanning"},"content":[{"data":{},"marks":[],"value":"secret scanning","nodeType":"text"}],"nodeType":"hyperlink"},{"data":{},"marks":[],"value":" to prevent breaches by proactively scanning for secrets pre-commit. Furthermore, if push protection is enabled, secret scanning searches for secrets that may have accidentally been pushed into code. This involves scanning code for patterns from GitHub partners, including Microsoft Azure, Amazon Web Services, Slack, and Google Cloud. Because scans take less than a second, GHAS quickly catches leaks as they occur.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"GHAS also offers:","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"","nodeType":"text"},{"data":{"uri":"https://docs.github.com/en/code-security/supply-chain-security/understanding-your-software-supply-chain/about-supply-chain-security"},"content":[{"data":{},"marks":[],"value":"Supply chain security","nodeType":"text"}],"nodeType":"hyperlink"},{"data":{},"marks":[],"value":" to catch vulnerable dependencies before they’re introduced into the codebase.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"","nodeType":"text"},{"data":{"uri":"https://docs.github.com/en/code-security/security-overview/about-the-security-overview"},"content":[{"data":{},"marks":[],"value":"Security overview","nodeType":"text"}],"nodeType":"hyperlink"},{"data":{},"marks":[],"value":" for a centralized, single view of security risks across the entire enterprise.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"","nodeType":"text"},{"data":{"uri":"https://github.com/features/actions"},"content":[{"data":{},"marks":[],"value":"GitHub Actions","nodeType":"text"}],"nodeType":"hyperlink"},{"data":{},"marks":[],"value":", which supports third-party security capabilities, including SAST engines, DAST, infrastructure as code scanning (IaC), and container scanning.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"}],"nodeType":"unordered-list"},{"data":{},"content":[{"data":{},"marks":[],"value":"Together, these GHAS features provide developers with just the right security information at just the right time. Whether the alerts are through the SAST, SCA, or secret scanning, you can be confident that your teams will be given the latest, most cutting-edge security intelligence, along with the cleanest suggestions available for fixing those issues.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"In summary, empowering developers with application security testing tools like GHAS to quickly and easily secure code themselves, helps speed remediation times from months to just a few minutes, and empowers developers to ship secure code faster.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"}}}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6O85JJDj60m1cPu2737LHA","type":"Entry","createdAt":"2024-03-22T14:22:34.387Z","updatedAt":"2024-10-09T18:17:06.049Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":21,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionFAQ"}},"locale":"en-US"},"fields":{"title":"/security/application-security-testing FAQ","sectionId":"faqs","heading":"Frequently asked questions","faqBlocks":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"460MG3H3mbmiD1CBeggDH8","type":"Entry","createdAt":"2024-03-22T14:22:34.404Z","updatedAt":"2024-03-22T14:22:34.404Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentFAQBlock"}},"locale":"en-US"},"fields":{"title":"/security/application-security-testing FAQ","questions":[]}}]}}]}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6oLpDvTHDo4BcO9AqND26O","type":"Entry","createdAt":"2023-03-28T19:08:35.673Z","updatedAt":"2024-05-07T16:49:30.899Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":6,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{"metaTitle":"Application security testing: tools, types and best practices – GitHub Resources","metaDescription":"Discover how to implement application security testing to ensure application security.","openGraphTitle":"Application Security Testing: Tools, Types and Best Practices | GitHub","openGraphDescription":"Discover the importance of application security testing (AST) to ensure the security of your applications. Learn about common types of attacks and vulnerabilities, the role of security testing tools, and best practices for implementing AST in your organization."}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"BbIACnVace0spiVgeZTvj","type":"Entry","createdAt":"2023-08-24T13:16:54.234Z","updatedAt":"2024-02-21T16:26:27.787Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/security/appsec-pitfalls","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1vIcYsb0Ug59GoZbfcppTQ","type":"Entry","createdAt":"2021-11-19T17:37:31.962Z","updatedAt":"2024-10-03T12:40:01.890Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":64,"revision":25,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"Resource Page for /security/appsec-pitfalls","path":"/security/appsec-pitfalls","title":"Complex, siloed, slow: Top AppSec pitfalls and how to avoid them","description":"Secure software is critical for organizations to stay in business today. But security can be easier said than done—due to the complexity, siloed teams, and slow processes.","body":"\u003cdiv class=\"embed-responsive embed-responsive-16by9\"\u003e\n \u003ciframe title=\"Discussion on how to avoid appsec pitfalls\" src=\"https://player.vimeo.com/video/393942416\" width=\"640\" height=\"480\" frameborder=\"0\" webkitallowfullscreen mozallowfullscreen allowfullscreen\u003e\u003c/iframe\u003e\n\u003c/div\u003e\n\nIn this webcast, Vitor Monteiro will share his experiences as a Strategic Architect at GitHub.\n\nYou’ll also learn:\n- The current state of application security (AppSec) and what it means for your organization\n- The three common AppSec pitfalls and how to avoid them","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"ittb0Obt4srpB99L848ie","type":"Entry","createdAt":"2022-03-13T19:10:41.497Z","updatedAt":"2022-03-13T20:23:20.317Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"video"}},"locale":"en-US"},"fields":{"speakers":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5pgGodTSyeoUDrF3NcNMTn","type":"Entry","createdAt":"2021-11-19T17:37:24.723Z","updatedAt":"2024-10-09T18:48:35.740Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":32,"revision":15,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Vitor Monteiro","avatar":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6lZC0dX5cj4wXSArMYafnn","type":"Asset","createdAt":"2021-11-19T17:37:24.209Z","updatedAt":"2021-11-19T17:37:24.209Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"locale":"en-US"},"fields":{"title":"assets/img/avatars/vitor-monteiro.jpeg","description":"assets/img/avatars/vitor-monteiro.jpeg","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/6lZC0dX5cj4wXSArMYafnn/a4b86dd29e26df2ed5b0377fbd57053a/assets_img_avatars_vitor-monteiro.jpeg","details":{"size":26292,"image":{"width":357,"height":357}},"fileName":"assets/img/avatars/vitor-monteiro.jpeg","contentType":"image/jpeg"}}},"title":"Strategic Architect","company":"GitHub"}}],"dateRecorded":"2022-02-26T00:00-05:00","isWebcast":true}},"gated":false,"sfCampaignID":"7015c000001SNN7AAO","campaign":"Resources_Contact_Us","contentForm":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3qHQ6eSp20iGQrFIfaBJnn","type":"Entry","createdAt":"2022-09-29T19:33:25.277Z","updatedAt":"2024-11-26T11:30:01.409Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":248,"revision":113,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"form"}},"locale":"en-US"},"fields":{"name":"Form_Ungated_Contact","title":"Wondering how GitHub can help your business?","subtitle":"Tell us more about your needs","eloquaFormName":"ContactUs_TemplateForm","formCTA":"Contact GitHub","formElements":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Euizanl72D7hjUPBu1cz4","type":"Entry","createdAt":"2023-04-04T12:27:44.815Z","updatedAt":"2024-11-26T11:37:30.225Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":372,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Last name","htmlName":"lastName","type":"text","placeholder":"Last name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6FMPEpNvfZnVg5o5pNdmAz","type":"Entry","createdAt":"2023-04-04T12:27:23.053Z","updatedAt":"2024-11-26T11:37:14.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":373,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"First name","htmlName":"firstName","type":"text","placeholder":"First name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6s0zB2lwQZz6ZhWkZQd5r0","type":"Entry","createdAt":"2022-09-29T18:54:51.900Z","updatedAt":"2024-11-26T11:36:43.185Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":234,"revision":112,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Work Email","htmlName":"emailAddress","type":"email","placeholder":"you@company.com","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3IumXBD9IQf1aCt2cTCoVh","type":"Entry","createdAt":"2023-06-23T19:25:51.253Z","updatedAt":"2024-11-26T11:36:56.805Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":212,"revision":105,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Phone","htmlName":"phone1","type":"tel","placeholder":"12 3456 7890","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5HOQnFx9120Wj4hlsjXaJn","type":"Entry","createdAt":"2022-03-12T20:19:03.843Z","updatedAt":"2024-11-26T11:37:58.388Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":374,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Company","htmlName":"company","type":"text","placeholder":"Acme, Inc","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1MS9X9RNVd6BmPN91fMsVg","type":"Entry","createdAt":"2022-09-29T19:31:39.832Z","updatedAt":"2024-11-26T11:37:05.764Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":209,"revision":104,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"What can we help you with?","htmlName":"contactComments","type":"textarea","placeholder":"Tell us how we can help. For support questions, head to github.com/contact ","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5zNCZ4hVsez1AWpp6Fga7h","type":"Entry","createdAt":"2022-03-12T20:23:32.191Z","updatedAt":"2024-11-20T14:58:44.487Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCustomerGUID","type":"hidden","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7a3HDjJcLkWmsPKHATLvna","type":"Entry","createdAt":"2022-03-12T20:24:00.556Z","updatedAt":"2024-11-20T14:58:44.527Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":18,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCookieWrite","type":"hidden","required":false,"defaultValue":"0"}}]}},"publicationDate":"2020-02-26T00:00:00.000Z","hidden":false,"marketoCampaign":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2ywGzPlFH9kTdiOBF75ggA","type":"Entry","createdAt":"2023-09-15T23:09:46.917Z","updatedAt":"2024-11-20T14:58:44.542Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":7,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"marketoCampaign"}},"locale":"en-US"},"fields":{"title":"CO-GHG-CONTACT-FY23-10Oct-01-WW-Resources-Contact-Request/406214","cDLProgramName":"406214","source":"Contact Request","formFields":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6z2cGa4cuvoWqGxS3Ejhv4","type":"Entry","createdAt":"2023-09-12T16:31:47.760Z","updatedAt":"2024-11-26T11:32:18.468Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":127,"revision":59,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"sFDCLastCampaignStatus","htmlName":"sFDCLastCampaignStatus","type":"hidden","required":false,"defaultValue":"Responded"}}],"active":true}}}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"seo--security-appsec-pitfalls","type":"Entry","createdAt":"2022-02-28T21:21:32.725Z","updatedAt":"2024-10-03T13:05:30.698Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":15,"revision":7,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{"metaTitle":"Complex, siloed, slow: Top AppSec pitfalls and how to avoid them","metaDescription":"Secure software is critical for organizations to stay in business today. But security can be easier said than done—due to the complexity, siloed teams, and slow processes.","metaImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"69JAQED42n6pYdS7PMaQ9O","type":"Asset","createdAt":"2021-11-19T17:37:28.873Z","updatedAt":"2021-11-19T17:37:28.873Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"locale":"en-US"},"fields":{"title":"/assets/img/social/webcasts/Q3SecurityWebinar3.png","description":"/assets/img/social/webcasts/Q3SecurityWebinar3.png","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/69JAQED42n6pYdS7PMaQ9O/8c747b78ea9b301d9c09be3c7c8cc8bf/_assets_img_social_webcasts_Q3SecurityWebinar3.png","details":{"size":95786,"image":{"width":1223,"height":647}},"fileName":"/assets/img/social/webcasts/Q3SecurityWebinar3.png","contentType":"image/png"}}},"openGraphTitle":"Complex, siloed, slow: Top AppSec pitfalls and how to avoid them","openGraphDescription":"Secure software is critical for organizations to stay in business today. But security can be easier said than done—due to the complexity, siloed teams, and slow processes."}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3fLBV38fGyd2KbyZKtjNgo","type":"Entry","createdAt":"2023-08-24T13:15:36.308Z","updatedAt":"2024-02-21T16:25:59.220Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/security/community-powered-security-developer-workflow","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2EKAUmqS3LIUaKHShpwCWK","type":"Entry","createdAt":"2021-11-19T17:39:01.458Z","updatedAt":"2024-10-03T12:39:11.568Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":65,"revision":25,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"/security/community-powered-security-developer-workflow","path":"/security/community-powered-security-developer-workflow","title":"Incorporating community-powered security into the developer workflow","description":"What if you could have an extra team member who reviews each pull request, with a special eye towards security? A team member who knows all the latest security research, and gives helpful feedback, making security part of your engineering culture?","body":"\u003cdiv class=\"embed-responsive embed-responsive-16by9\"\u003e\n \u003ciframe title=\"How GitHub and Semmle created automated code reviews\" src=\"https://player.vimeo.com/video/364164951\" width=\"640\" height=\"480\" frameborder=\"0\" webkitallowfullscreen mozallowfullscreen allowfullscreen\u003e\u003c/iframe\u003e\n\u003c/div\u003e\n\nToo hard to recruit and too expensive? GitHub and Semmle combine to provide the next best thing: automated code review for developers, powered by the security community’s expertise.\n\nJoin us as Semmle founder and CEO, Oege de Moor, and Chief Security Officer, Fermín Serna, share this vision for community-powered secure development, and explain how your team can benefit from the advice from the world’s top security researchers. We will also be joined by Keith Hoodlet, Sr. Manager DevOps, to learn how Thermo Fisher is instilling a security-focused development culture by prioritizing “security as a feature”.\n\nIn this webinar you will learn how:\n\n- Community-powered security can be part of every developer’s workflow\n- Semmle QL is changing the way security researchers perform variant analysis and share their knowledge\n- Leading enterprises are benefiting from this shared knowledge for continuous security, and contribute back to the community\n","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2jQO6k4P7pnrKaNRB9KQQB","type":"Entry","createdAt":"2022-03-14T02:48:33.884Z","updatedAt":"2022-03-14T02:48:51.360Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"video"}},"locale":"en-US"},"fields":{"speakers":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6291Sg9MXfpMoBVKvG4Rvy","type":"Entry","createdAt":"2021-11-19T17:38:55.877Z","updatedAt":"2024-10-09T18:49:30.129Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":32,"revision":15,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Oege de Moor","avatar":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"36LUOXaFxvJKotCoD7Hrid","type":"Asset","createdAt":"2021-11-19T17:38:28.318Z","updatedAt":"2021-11-19T17:38:28.318Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"locale":"en-US"},"fields":{"title":"assets/img/avatars/oege.jpg","description":"assets/img/avatars/oege.jpg","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/36LUOXaFxvJKotCoD7Hrid/510c29fa91d67013f3d0785f397e576a/assets_img_avatars_oege.jpg","details":{"size":103170,"image":{"width":450,"height":450}},"fileName":"assets/img/avatars/oege.jpg","contentType":"image/jpeg"}}},"title":"CEO and Founder","company":"Semmle"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5U1Vt0ZWhIUp3VG6b3kkXZ","type":"Entry","createdAt":"2021-11-19T17:38:23.419Z","updatedAt":"2024-10-09T18:49:10.133Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":32,"revision":15,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Fermín Serna","avatar":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3qOLkM3O5whBgwivrP405z","type":"Asset","createdAt":"2021-11-19T17:38:22.867Z","updatedAt":"2021-11-19T17:38:22.867Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"locale":"en-US"},"fields":{"title":"assets/img/avatars/ferm.png","description":"assets/img/avatars/ferm.png","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/3qOLkM3O5whBgwivrP405z/4493d2d390e290b434471ce01d38bb2a/assets_img_avatars_ferm.png","details":{"size":146000,"image":{"width":300,"height":300}},"fileName":"assets/img/avatars/ferm.png","contentType":"image/png"}}},"title":"CSO","company":"Semmle"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2xHiS9ZxoV4Pr5mi7YqH8D","type":"Entry","createdAt":"2021-11-19T17:38:58.335Z","updatedAt":"2024-10-09T18:49:37.027Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":32,"revision":15,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Keith Hoodlet","avatar":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Og65qRUB2TUkeoelCzneY","type":"Asset","createdAt":"2021-11-19T17:38:43.628Z","updatedAt":"2021-11-19T17:38:43.628Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"locale":"en-US"},"fields":{"title":"assets/img/avatars/keithhoodlet.jpeg","description":"assets/img/avatars/keithhoodlet.jpeg","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/3Og65qRUB2TUkeoelCzneY/d753992ef8f1fcb9f592ec4af7bcc76e/assets_img_avatars_keithhoodlet.jpeg","details":{"size":54711,"image":{"width":500,"height":500}},"fileName":"assets/img/avatars/keithhoodlet.jpeg","contentType":"image/jpeg"}}},"title":"Senior Manager of DevOps","company":"Thermo Fisher"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7s3objZJWV5axM88uQjDG2","type":"Entry","createdAt":"2021-11-19T17:38:59.258Z","updatedAt":"2024-10-09T18:49:40.320Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":32,"revision":15,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Kelly Stirman","avatar":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"41soONsykOPQFTB4E9em0S","type":"Asset","createdAt":"2021-11-19T17:38:47.979Z","updatedAt":"2021-11-19T17:38:47.979Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"locale":"en-US"},"fields":{"title":"assets/img/avatars/kstirman.jpeg","description":"assets/img/avatars/kstirman.jpeg","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/41soONsykOPQFTB4E9em0S/b0750d7a968a66df677a5c4c46e0a13f/assets_img_avatars_kstirman.jpeg","details":{"size":32956,"image":{"width":450,"height":450}},"fileName":"assets/img/avatars/kstirman.jpeg","contentType":"image/jpeg"}}},"title":"VP, Strategy and Product Marketing","company":"GitHub"}}],"dateRecorded":"2019-10-03T00:00-05:00","isWebcast":true}},"gated":false,"sfCampaignID":"7015c000001SNN7AAO","campaign":"Resources_Contact_Us","contentForm":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3qHQ6eSp20iGQrFIfaBJnn","type":"Entry","createdAt":"2022-09-29T19:33:25.277Z","updatedAt":"2024-11-26T11:30:01.409Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":248,"revision":113,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"form"}},"locale":"en-US"},"fields":{"name":"Form_Ungated_Contact","title":"Wondering how GitHub can help your business?","subtitle":"Tell us more about your needs","eloquaFormName":"ContactUs_TemplateForm","formCTA":"Contact GitHub","formElements":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Euizanl72D7hjUPBu1cz4","type":"Entry","createdAt":"2023-04-04T12:27:44.815Z","updatedAt":"2024-11-26T11:37:30.225Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":372,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Last name","htmlName":"lastName","type":"text","placeholder":"Last name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6FMPEpNvfZnVg5o5pNdmAz","type":"Entry","createdAt":"2023-04-04T12:27:23.053Z","updatedAt":"2024-11-26T11:37:14.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":373,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"First name","htmlName":"firstName","type":"text","placeholder":"First name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6s0zB2lwQZz6ZhWkZQd5r0","type":"Entry","createdAt":"2022-09-29T18:54:51.900Z","updatedAt":"2024-11-26T11:36:43.185Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":234,"revision":112,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Work Email","htmlName":"emailAddress","type":"email","placeholder":"you@company.com","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3IumXBD9IQf1aCt2cTCoVh","type":"Entry","createdAt":"2023-06-23T19:25:51.253Z","updatedAt":"2024-11-26T11:36:56.805Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":212,"revision":105,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Phone","htmlName":"phone1","type":"tel","placeholder":"12 3456 7890","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5HOQnFx9120Wj4hlsjXaJn","type":"Entry","createdAt":"2022-03-12T20:19:03.843Z","updatedAt":"2024-11-26T11:37:58.388Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":374,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Company","htmlName":"company","type":"text","placeholder":"Acme, Inc","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1MS9X9RNVd6BmPN91fMsVg","type":"Entry","createdAt":"2022-09-29T19:31:39.832Z","updatedAt":"2024-11-26T11:37:05.764Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":209,"revision":104,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"What can we help you with?","htmlName":"contactComments","type":"textarea","placeholder":"Tell us how we can help. For support questions, head to github.com/contact ","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5zNCZ4hVsez1AWpp6Fga7h","type":"Entry","createdAt":"2022-03-12T20:23:32.191Z","updatedAt":"2024-11-20T14:58:44.487Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCustomerGUID","type":"hidden","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7a3HDjJcLkWmsPKHATLvna","type":"Entry","createdAt":"2022-03-12T20:24:00.556Z","updatedAt":"2024-11-20T14:58:44.527Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":18,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCookieWrite","type":"hidden","required":false,"defaultValue":"0"}}]}},"publicationDate":"2019-10-03T00:00:00.000Z","hidden":false,"marketoCampaign":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2ywGzPlFH9kTdiOBF75ggA","type":"Entry","createdAt":"2023-09-15T23:09:46.917Z","updatedAt":"2024-11-20T14:58:44.542Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":7,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"marketoCampaign"}},"locale":"en-US"},"fields":{"title":"CO-GHG-CONTACT-FY23-10Oct-01-WW-Resources-Contact-Request/406214","cDLProgramName":"406214","source":"Contact Request","formFields":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6z2cGa4cuvoWqGxS3Ejhv4","type":"Entry","createdAt":"2023-09-12T16:31:47.760Z","updatedAt":"2024-11-26T11:32:18.468Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":127,"revision":59,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"sFDCLastCampaignStatus","htmlName":"sFDCLastCampaignStatus","type":"hidden","required":false,"defaultValue":"Responded"}}],"active":true}}}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"seo--security-community-powered-security-developer-workflow","type":"Entry","createdAt":"2022-02-28T21:21:42.755Z","updatedAt":"2024-10-03T13:05:05.346Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":6,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{"metaTitle":"\"Incorporating community-powered security into the developer workflow\"","metaDescription":"What if you could have an extra team member who reviews each pull request, with a special eye towards security? A team member who knows all the latest security research, and gives helpful feedback, making security part of your engineering culture?","metaImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1PLWFFNV0m1JcHNP7r1kBK","type":"Asset","createdAt":"2021-11-19T17:38:53.749Z","updatedAt":"2021-11-19T17:38:53.749Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"locale":"en-US"},"fields":{"title":"/assets/img/social/webcasts/OctoberSecurityWebcastSocialCard.png","description":"/assets/img/social/webcasts/OctoberSecurityWebcastSocialCard.png","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/1PLWFFNV0m1JcHNP7r1kBK/c63f42041f172ab99d5e25cfa6159a6c/_assets_img_social_webcasts_OctoberSecurityWebcastSocialCard.png","details":{"size":247500,"image":{"width":1200,"height":630}},"fileName":"/assets/img/social/webcasts/OctoberSecurityWebcastSocialCard.png","contentType":"image/png"}}},"openGraphTitle":"\"Incorporating community-powered security into the developer workflow\"","openGraphDescription":"What if you could have an extra team member who reviews each pull request, with a special eye towards security? A team member who knows all the latest security research, and gives helpful feedback, making security part of your engineering culture?"}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"15jyCdZMSGqKg7GZP25pdz","type":"Entry","createdAt":"2024-01-11T21:00:33.637Z","updatedAt":"2024-10-09T18:27:42.870Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":30,"revision":15,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"innersource","label":"Innersource"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5aHPoOgGsLo1ygwGcfzBq7","type":"Entry","createdAt":"2023-08-24T13:14:12.296Z","updatedAt":"2024-02-21T16:25:47.798Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/security/ghas/achieving-devsecops-with-advanced-security","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"fw51OYVSaGs1fK0YkUM44","type":"Entry","createdAt":"2021-11-19T17:37:02.180Z","updatedAt":"2024-10-03T12:38:43.540Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":71,"revision":25,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"/security/ghas/achieving-devsecops-with-advanced-security","path":"/security/ghas/achieving-devsecops-with-advanced-security","title":"Demo Day: Achieving DevSecOps with GitHub Advanced Security","description":"Get hands-on support for the next step of your DevSecOps journey. Join us for a technical deep dive into GitHub Advanced Security with a step-by-step demo on features like code scanning and secret scanning—and a look at what this means for baking security into the developer workflow.","body":"\u003cdiv class=\"embed-responsive embed-responsive-16by9\"\u003e\n\u003ciframe title=\"An explanation of technical application security features on GitHub\" src=\"https://player.vimeo.com/video/531370656\" width=\"640\" height=\"480\" frameborder=\"0\" webkitallowfullscreen mozallowfullscreen allowfullscreen\u003e\u003c/iframe\u003e\u003c/div\u003e","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"57AsHJGIuh0AiMRbAD3sEV","type":"Entry","createdAt":"2022-03-13T19:16:11.205Z","updatedAt":"2022-03-13T20:12:03.078Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":4,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"video"}},"locale":"en-US"},"fields":{"speakers":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4HrGL5je2gartV7g4O10I6","type":"Entry","createdAt":"2021-11-19T17:36:43.625Z","updatedAt":"2024-10-09T18:47:50.477Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":32,"revision":15,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Rohit N B","avatar":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7DdRMDTZ8K2cAQrW9ihTsD","type":"Asset","createdAt":"2021-11-19T17:36:43.094Z","updatedAt":"2021-11-19T17:36:43.094Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"locale":"en-US"},"fields":{"title":"assets/img/avatars/rohit-n-b.png","description":"assets/img/avatars/rohit-n-b.png","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/7DdRMDTZ8K2cAQrW9ihTsD/6f0c4ebec7bde200654db5651e612bc8/assets_img_avatars_rohit-n-b.png","details":{"size":63877,"image":{"width":155,"height":154}},"fileName":"assets/img/avatars/rohit-n-b.png","contentType":"image/png"}}},"title":"Solutions Engineer","company":"GitHub"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1CPLJq3dvi6OwF6DmnrUfF","type":"Entry","createdAt":"2021-11-19T17:36:57.234Z","updatedAt":"2024-10-09T18:48:08.318Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":32,"revision":15,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Isaac Cohen","avatar":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"dJkJidvGL5ItNQYxE9XSu","type":"Asset","createdAt":"2021-11-19T17:36:47.286Z","updatedAt":"2021-11-19T17:36:47.286Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"locale":"en-US"},"fields":{"title":"assets/img/avatars/isaac-cohen.png","description":"assets/img/avatars/isaac-cohen.png","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/dJkJidvGL5ItNQYxE9XSu/82b30d977c84a255650ac7021c5707e1/assets_img_avatars_isaac-cohen.png","details":{"size":25674,"image":{"width":164,"height":164}},"fileName":"assets/img/avatars/isaac-cohen.png","contentType":"image/png"}}},"title":"Field Solutions Architect","company":"GitHub"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"10ZS2nieaF14k2Is0sNDtB","type":"Entry","createdAt":"2021-11-19T17:36:59.196Z","updatedAt":"2024-10-09T18:55:21.653Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":42,"revision":21,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Kevin Alwell","title":"Director, Field Services, FSI \u0026 Healthcare","company":"GitHub"}}],"dateRecorded":"2022-03-30T00:00-05:00","isWebcast":true}},"gated":false,"sfCampaignID":"7015c000001SNN7AAO","campaign":"Resources_Contact_Us","contentForm":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3qHQ6eSp20iGQrFIfaBJnn","type":"Entry","createdAt":"2022-09-29T19:33:25.277Z","updatedAt":"2024-11-26T11:30:01.409Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":248,"revision":113,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"form"}},"locale":"en-US"},"fields":{"name":"Form_Ungated_Contact","title":"Wondering how GitHub can help your business?","subtitle":"Tell us more about your needs","eloquaFormName":"ContactUs_TemplateForm","formCTA":"Contact GitHub","formElements":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Euizanl72D7hjUPBu1cz4","type":"Entry","createdAt":"2023-04-04T12:27:44.815Z","updatedAt":"2024-11-26T11:37:30.225Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":372,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Last name","htmlName":"lastName","type":"text","placeholder":"Last name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6FMPEpNvfZnVg5o5pNdmAz","type":"Entry","createdAt":"2023-04-04T12:27:23.053Z","updatedAt":"2024-11-26T11:37:14.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":373,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"First name","htmlName":"firstName","type":"text","placeholder":"First name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6s0zB2lwQZz6ZhWkZQd5r0","type":"Entry","createdAt":"2022-09-29T18:54:51.900Z","updatedAt":"2024-11-26T11:36:43.185Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":234,"revision":112,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Work Email","htmlName":"emailAddress","type":"email","placeholder":"you@company.com","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3IumXBD9IQf1aCt2cTCoVh","type":"Entry","createdAt":"2023-06-23T19:25:51.253Z","updatedAt":"2024-11-26T11:36:56.805Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":212,"revision":105,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Phone","htmlName":"phone1","type":"tel","placeholder":"12 3456 7890","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5HOQnFx9120Wj4hlsjXaJn","type":"Entry","createdAt":"2022-03-12T20:19:03.843Z","updatedAt":"2024-11-26T11:37:58.388Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":374,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Company","htmlName":"company","type":"text","placeholder":"Acme, Inc","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1MS9X9RNVd6BmPN91fMsVg","type":"Entry","createdAt":"2022-09-29T19:31:39.832Z","updatedAt":"2024-11-26T11:37:05.764Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":209,"revision":104,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"What can we help you with?","htmlName":"contactComments","type":"textarea","placeholder":"Tell us how we can help. For support questions, head to github.com/contact ","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5zNCZ4hVsez1AWpp6Fga7h","type":"Entry","createdAt":"2022-03-12T20:23:32.191Z","updatedAt":"2024-11-20T14:58:44.487Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCustomerGUID","type":"hidden","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7a3HDjJcLkWmsPKHATLvna","type":"Entry","createdAt":"2022-03-12T20:24:00.556Z","updatedAt":"2024-11-20T14:58:44.527Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":18,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCookieWrite","type":"hidden","required":false,"defaultValue":"0"}}]}},"buttonCTA":"Contact GitHub","publicationDate":"2021-03-30T00:00:00.000Z","hidden":false,"marketoCampaign":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2ywGzPlFH9kTdiOBF75ggA","type":"Entry","createdAt":"2023-09-15T23:09:46.917Z","updatedAt":"2024-11-20T14:58:44.542Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":7,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"marketoCampaign"}},"locale":"en-US"},"fields":{"title":"CO-GHG-CONTACT-FY23-10Oct-01-WW-Resources-Contact-Request/406214","cDLProgramName":"406214","source":"Contact Request","formFields":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6z2cGa4cuvoWqGxS3Ejhv4","type":"Entry","createdAt":"2023-09-12T16:31:47.760Z","updatedAt":"2024-11-26T11:32:18.468Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":127,"revision":59,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"sFDCLastCampaignStatus","htmlName":"sFDCLastCampaignStatus","type":"hidden","required":false,"defaultValue":"Responded"}}],"active":true}}}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"seo--security-ghas-achieving-devsecops-with-advanced-security","type":"Entry","createdAt":"2022-02-28T21:21:30.696Z","updatedAt":"2024-10-03T13:04:49.719Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":15,"revision":7,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{"metaTitle":"Demo Day: Achieving DevSecOps with GitHub Advanced Security","metaDescription":"Get hands-on support for the next step of your DevSecOps journey. Join us for a technical deep dive into GitHub Advanced Security with a step-by-step demo on features like code scanning and secret scanning.","openGraphTitle":"Demo Day: Achieving DevSecOps with GitHub Advanced Security","openGraphDescription":"Get hands-on support for the next step of your DevSecOps journey. Join us for a technical deep dive into GitHub Advanced Security with a step-by-step demo on features like code scanning and secret scanning."}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5R9zfL5sHOvIqOX4WnG1mJ","type":"Entry","createdAt":"2024-01-11T21:00:30.758Z","updatedAt":"2024-11-26T10:53:17.315Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":85,"revision":44,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"github-advanced-security","label":"GitHub Advanced Security"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2ZGiR9W4aF864mk5d9H1er","type":"Entry","createdAt":"2023-08-24T13:16:55.290Z","updatedAt":"2024-02-21T16:26:28.497Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/security/integrating-github-advanced-security-with-third-party-platforms","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Q3AKBd6qWLM2gEnUi2ghj","type":"Entry","createdAt":"2022-09-07T11:50:41.397Z","updatedAt":"2024-10-03T12:40:04.677Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":63,"revision":18,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"Resource Page for /security/integrating-github-advanced-security-with-third-party-platforms","path":"/security/integrating-github-advanced-security-with-third-party-platforms","title":"Integrating GitHub Advanced Security with third party reporting and analytics platforms","description":"This document is intended to capture strategies for integrating and ingesting alerts from the GitHub Advanced Security (GHAS) platform into external reporting, Security Information and Event Management (SIEM) services, and vulnerability analytics platforms.","body":"Integrating the metrics provided by GitHub Advanced Security into an external reporting and analytics platform allows customers to gain deeper insight into their application security posture.\n\nWhat we’ll cover in this white paper:\n- Methods for extracting information from the GitHub platform for ingestion in a reporting tool\n- Ideal integration methods\n- Metrics to watch in your reporting/SIEM tool","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4GfDSDMsI5y0RcEa4pwNaz","type":"Entry","createdAt":"2022-09-07T11:48:17.816Z","updatedAt":"2022-10-05T13:00:23.870Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"article"}},"locale":"en-US"},"fields":{"attachment":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6Of080Yx7kpW0vdu6E38b1","type":"Asset","createdAt":"2022-10-05T13:00:17.318Z","updatedAt":"2022-10-05T13:00:17.318Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"/download/security/integrating-github-advanced-security-with-third-party-platforms-v2/","description":"","file":{"url":"//assets.ctfassets.net/wfutmusr1t3h/6Of080Yx7kpW0vdu6E38b1/d81bc4c11b9390ca37adeb9652ea3079/Integrating_GitHub_Advanced_Security_with_third_party_reporting_and_analytics_platforms.pdf","details":{"size":165207},"fileName":"Integrating GitHub Advanced Security with third party reporting and analytics platforms.pdf","contentType":"application/pdf"}}}}},"gated":false,"sfCampaignID":"7015c000001SNN7AAO","campaign":"Resources_Contact_Us","contentForm":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3qHQ6eSp20iGQrFIfaBJnn","type":"Entry","createdAt":"2022-09-29T19:33:25.277Z","updatedAt":"2024-11-26T11:30:01.409Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":248,"revision":113,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"form"}},"locale":"en-US"},"fields":{"name":"Form_Ungated_Contact","title":"Wondering how GitHub can help your business?","subtitle":"Tell us more about your needs","eloquaFormName":"ContactUs_TemplateForm","formCTA":"Contact GitHub","formElements":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Euizanl72D7hjUPBu1cz4","type":"Entry","createdAt":"2023-04-04T12:27:44.815Z","updatedAt":"2024-11-26T11:37:30.225Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":372,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Last name","htmlName":"lastName","type":"text","placeholder":"Last name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6FMPEpNvfZnVg5o5pNdmAz","type":"Entry","createdAt":"2023-04-04T12:27:23.053Z","updatedAt":"2024-11-26T11:37:14.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":373,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"First name","htmlName":"firstName","type":"text","placeholder":"First name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6s0zB2lwQZz6ZhWkZQd5r0","type":"Entry","createdAt":"2022-09-29T18:54:51.900Z","updatedAt":"2024-11-26T11:36:43.185Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":234,"revision":112,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Work Email","htmlName":"emailAddress","type":"email","placeholder":"you@company.com","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3IumXBD9IQf1aCt2cTCoVh","type":"Entry","createdAt":"2023-06-23T19:25:51.253Z","updatedAt":"2024-11-26T11:36:56.805Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":212,"revision":105,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Phone","htmlName":"phone1","type":"tel","placeholder":"12 3456 7890","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5HOQnFx9120Wj4hlsjXaJn","type":"Entry","createdAt":"2022-03-12T20:19:03.843Z","updatedAt":"2024-11-26T11:37:58.388Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":374,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Company","htmlName":"company","type":"text","placeholder":"Acme, Inc","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1MS9X9RNVd6BmPN91fMsVg","type":"Entry","createdAt":"2022-09-29T19:31:39.832Z","updatedAt":"2024-11-26T11:37:05.764Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":209,"revision":104,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"What can we help you with?","htmlName":"contactComments","type":"textarea","placeholder":"Tell us how we can help. For support questions, head to github.com/contact ","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5zNCZ4hVsez1AWpp6Fga7h","type":"Entry","createdAt":"2022-03-12T20:23:32.191Z","updatedAt":"2024-11-20T14:58:44.487Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCustomerGUID","type":"hidden","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7a3HDjJcLkWmsPKHATLvna","type":"Entry","createdAt":"2022-03-12T20:24:00.556Z","updatedAt":"2024-11-20T14:58:44.527Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":18,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCookieWrite","type":"hidden","required":false,"defaultValue":"0"}}]}},"headerCTA":"Download PDF","buttonCTA":"Contact GitHub","publicationDate":"2022-09-07T00:00+00:00","renderedDate":"September 2022","hidden":false,"rendersRichText":false,"marketoCampaign":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2ywGzPlFH9kTdiOBF75ggA","type":"Entry","createdAt":"2023-09-15T23:09:46.917Z","updatedAt":"2024-11-20T14:58:44.542Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":7,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"marketoCampaign"}},"locale":"en-US"},"fields":{"title":"CO-GHG-CONTACT-FY23-10Oct-01-WW-Resources-Contact-Request/406214","cDLProgramName":"406214","source":"Contact Request","formFields":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6z2cGa4cuvoWqGxS3Ejhv4","type":"Entry","createdAt":"2023-09-12T16:31:47.760Z","updatedAt":"2024-11-26T11:32:18.468Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":127,"revision":59,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"sFDCLastCampaignStatus","htmlName":"sFDCLastCampaignStatus","type":"hidden","required":false,"defaultValue":"Responded"}}],"active":true}}}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1oAtnosZZJlmQYFY1zUqeC","type":"Entry","createdAt":"2022-09-07T11:49:49.062Z","updatedAt":"2024-10-03T13:05:33.255Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{"metaDescription":"This document is intended to capture strategies for integrating and ingesting alerts from the GitHub Advanced Security (GHAS) platform into external reporting, Security Information and Event Management (SIEM) services, and vulnerability analytics platforms"}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4nnkosBS7viXX8GMuCe60Q","type":"Entry","createdAt":"2023-08-24T13:15:15.400Z","updatedAt":"2024-02-21T16:25:55.219Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/security/product/building-blocks-product-security","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4iod2tnpaDZbWkBc9k3ddk","type":"Entry","createdAt":"2021-11-19T17:38:29.930Z","updatedAt":"2024-10-03T12:39:08.102Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":49,"revision":22,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"Resource Page for /security/product/building-blocks-product-security","path":"/security/product/building-blocks-product-security","title":"Solving for a security-first approach: building blocks for scalable product security","description":"Cybersecurity is facing its watershed moment. As developer release cycles are accelerating, organizations are quickly realizing there are simply not enough skilled security engineers available to protect their code.","body":"While the largest organizations are struggling to scale their product security, everyone else is challenged with where to begin.\n\nJoin Fermín Serna and Oege de Moor, as they share the building blocks for creating and scaling effective product security across teams, organizations and codebases.\n\nIn this webinar, you'll learn:\n\n- The common challenges in vulnerability hunting\n- How to avoid critical variants of vulnerabilities going undetected\n- Practical techniques to mitigate the risk of vulnerabilities and their variants\n\n\u003cdiv class=\"embed-responsive embed-responsive-16by9\"\u003e\n \u003ciframe src=\"https://www.youtube.com/embed/nY991AhhATw\" width=\"640\" height=\"480\" frameborder=\"0\" webkitallowfullscreen mozallowfullscreen allowfullscreen\u003e\u003c/iframe\u003e\n\u003c/div\u003e","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"22LuMKfzZrmlaTb80Buau8","type":"Entry","createdAt":"2021-11-19T17:38:29.403Z","updatedAt":"2022-03-13T21:22:23.480Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"video"}},"locale":"en-US"},"fields":{"speakers":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5U1Vt0ZWhIUp3VG6b3kkXZ","type":"Entry","createdAt":"2021-11-19T17:38:23.419Z","updatedAt":"2024-10-09T18:49:10.133Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":32,"revision":15,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Fermín Serna","avatar":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3qOLkM3O5whBgwivrP405z","type":"Asset","createdAt":"2021-11-19T17:38:22.867Z","updatedAt":"2021-11-19T17:38:22.867Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"locale":"en-US"},"fields":{"title":"assets/img/avatars/ferm.png","description":"assets/img/avatars/ferm.png","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/3qOLkM3O5whBgwivrP405z/4493d2d390e290b434471ce01d38bb2a/assets_img_avatars_ferm.png","details":{"size":146000,"image":{"width":300,"height":300}},"fileName":"assets/img/avatars/ferm.png","contentType":"image/png"}}},"title":"CSO","company":"Semmle"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1A39Rdtl0jZCsDWzGEHH7Q","type":"Entry","createdAt":"2021-11-19T17:38:28.860Z","updatedAt":"2024-10-09T18:49:13.474Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":32,"revision":15,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Oege De Moor","avatar":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"36LUOXaFxvJKotCoD7Hrid","type":"Asset","createdAt":"2021-11-19T17:38:28.318Z","updatedAt":"2021-11-19T17:38:28.318Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"locale":"en-US"},"fields":{"title":"assets/img/avatars/oege.jpg","description":"assets/img/avatars/oege.jpg","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/36LUOXaFxvJKotCoD7Hrid/510c29fa91d67013f3d0785f397e576a/assets_img_avatars_oege.jpg","details":{"size":103170,"image":{"width":450,"height":450}},"fileName":"assets/img/avatars/oege.jpg","contentType":"image/jpeg"}}},"title":"CEO","company":"Semmle"}}],"dateRecorded":"2019-05-23T04:00:00.000Z","isWebcast":true}},"gated":false,"sfCampaignID":"7015c000001SNN7AAO","campaign":"Resources_Contact_Us","contentForm":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3qHQ6eSp20iGQrFIfaBJnn","type":"Entry","createdAt":"2022-09-29T19:33:25.277Z","updatedAt":"2024-11-26T11:30:01.409Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":248,"revision":113,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"form"}},"locale":"en-US"},"fields":{"name":"Form_Ungated_Contact","title":"Wondering how GitHub can help your business?","subtitle":"Tell us more about your needs","eloquaFormName":"ContactUs_TemplateForm","formCTA":"Contact GitHub","formElements":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Euizanl72D7hjUPBu1cz4","type":"Entry","createdAt":"2023-04-04T12:27:44.815Z","updatedAt":"2024-11-26T11:37:30.225Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":372,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Last name","htmlName":"lastName","type":"text","placeholder":"Last name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6FMPEpNvfZnVg5o5pNdmAz","type":"Entry","createdAt":"2023-04-04T12:27:23.053Z","updatedAt":"2024-11-26T11:37:14.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":373,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"First name","htmlName":"firstName","type":"text","placeholder":"First name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6s0zB2lwQZz6ZhWkZQd5r0","type":"Entry","createdAt":"2022-09-29T18:54:51.900Z","updatedAt":"2024-11-26T11:36:43.185Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":234,"revision":112,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Work Email","htmlName":"emailAddress","type":"email","placeholder":"you@company.com","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3IumXBD9IQf1aCt2cTCoVh","type":"Entry","createdAt":"2023-06-23T19:25:51.253Z","updatedAt":"2024-11-26T11:36:56.805Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":212,"revision":105,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Phone","htmlName":"phone1","type":"tel","placeholder":"12 3456 7890","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5HOQnFx9120Wj4hlsjXaJn","type":"Entry","createdAt":"2022-03-12T20:19:03.843Z","updatedAt":"2024-11-26T11:37:58.388Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":374,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Company","htmlName":"company","type":"text","placeholder":"Acme, Inc","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1MS9X9RNVd6BmPN91fMsVg","type":"Entry","createdAt":"2022-09-29T19:31:39.832Z","updatedAt":"2024-11-26T11:37:05.764Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":209,"revision":104,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"What can we help you with?","htmlName":"contactComments","type":"textarea","placeholder":"Tell us how we can help. For support questions, head to github.com/contact ","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5zNCZ4hVsez1AWpp6Fga7h","type":"Entry","createdAt":"2022-03-12T20:23:32.191Z","updatedAt":"2024-11-20T14:58:44.487Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCustomerGUID","type":"hidden","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7a3HDjJcLkWmsPKHATLvna","type":"Entry","createdAt":"2022-03-12T20:24:00.556Z","updatedAt":"2024-11-20T14:58:44.527Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":18,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCookieWrite","type":"hidden","required":false,"defaultValue":"0"}}]}},"buttonCTA":"Contact GitHub","publicationDate":"2019-05-23T00:00:00.000Z","hidden":false,"marketoCampaign":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2ywGzPlFH9kTdiOBF75ggA","type":"Entry","createdAt":"2023-09-15T23:09:46.917Z","updatedAt":"2024-11-20T14:58:44.542Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":7,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"marketoCampaign"}},"locale":"en-US"},"fields":{"title":"CO-GHG-CONTACT-FY23-10Oct-01-WW-Resources-Contact-Request/406214","cDLProgramName":"406214","source":"Contact Request","formFields":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6z2cGa4cuvoWqGxS3Ejhv4","type":"Entry","createdAt":"2023-09-12T16:31:47.760Z","updatedAt":"2024-11-26T11:32:18.468Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":127,"revision":59,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"sFDCLastCampaignStatus","htmlName":"sFDCLastCampaignStatus","type":"hidden","required":false,"defaultValue":"Responded"}}],"active":true}}}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"seo--security-product-building-blocks-product-security","type":"Entry","createdAt":"2022-02-28T21:21:38.438Z","updatedAt":"2024-05-07T16:52:50.085Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":6,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{"metaTitle":"Solving for a security-first approach: building blocks for scalable product security","metaDescription":"Cybersecurity is facing its watershed moment. As developer release cycles are accelerating, organizations are quickly realizing there are simply not enough skilled security engineers available to protect their code.","openGraphTitle":"Solving for a security-first approach: building blocks for scalable product security","openGraphDescription":"Cybersecurity is facing its watershed moment. As developer release cycles are accelerating, organizations are quickly realizing there are simply not enough skilled security engineers available to protect their code."}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1luSxQAmHW23yDjbNYc5Dd","type":"Entry","createdAt":"2024-01-11T21:03:07.745Z","updatedAt":"2024-02-21T16:25:33.323Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/security/scaling-github-advanced-security","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1bRArcrWgRUiYKaEgn5k9K","type":"Entry","createdAt":"2022-04-01T10:51:08.514Z","updatedAt":"2024-10-03T12:48:02.072Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":51,"revision":13,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"Resource Page for /security/scaling-github-advanced-security","path":"/security/scaling-github-advanced-security","title":"Adopting and scaling GitHub Advanced Security in your company","description":"Let's talk about how you can scale and adopt GitHub Advanced Security in an automated and structured fashion","body":"In this whitepaper, we will walk through enabling and scaling GitHub Advanced Security (GHAS) across an enterprise in an automated but structured way. The core purpose is to share best practices based on previous implementations, helping larger organisations approach GitHub Advanced Security (GHAS) in an automated fashion.\n\nYou will learn:\n- How to approach a rollout of GitHub Advanced Security. Including subjects such as documentation, education and scripting. \n- How you can leverage API's and pre-built open source solutions to automatically bulk enable code scanning across hundreds of GitHub repositories. \n- A structured approach to secret scanning. \n\nThis whitepaper is a technical resource aimed at people interested in the details of a rollout. ","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3nEhLfHsOFDFBdRgQruf2G","type":"Entry","createdAt":"2022-04-01T10:37:55.559Z","updatedAt":"2022-04-05T14:36:05.659Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":4,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"article"}},"locale":"en-US"},"fields":{"attachment":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7rbooz6hi5leHDyvjD3FCy","type":"Asset","createdAt":"2022-04-01T10:37:38.791Z","updatedAt":"2022-04-01T10:37:38.791Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"/downloads/Whitepaper-Scaling-GHAS-in-an-Enterprise.pdf","description":"Whitepaper-Scaling-GHAS-in-an-Enterprise","file":{"url":"//assets.ctfassets.net/wfutmusr1t3h/7rbooz6hi5leHDyvjD3FCy/4cb66560d58afad3f58197f7d4f37f23/Whitepaper-Scaling-GHAS-in-an-Enterprise.pdf","details":{"size":490547},"fileName":"Whitepaper-Scaling-GHAS-in-an-Enterprise.pdf","contentType":"application/pdf"}}}}},"gated":false,"sfCampaignID":"7015c000001SNN7AAO","campaign":"Resources_Contact_Us","contentForm":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3qHQ6eSp20iGQrFIfaBJnn","type":"Entry","createdAt":"2022-09-29T19:33:25.277Z","updatedAt":"2024-11-26T11:30:01.409Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":248,"revision":113,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"form"}},"locale":"en-US"},"fields":{"name":"Form_Ungated_Contact","title":"Wondering how GitHub can help your business?","subtitle":"Tell us more about your needs","eloquaFormName":"ContactUs_TemplateForm","formCTA":"Contact GitHub","formElements":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Euizanl72D7hjUPBu1cz4","type":"Entry","createdAt":"2023-04-04T12:27:44.815Z","updatedAt":"2024-11-26T11:37:30.225Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":372,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Last name","htmlName":"lastName","type":"text","placeholder":"Last name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6FMPEpNvfZnVg5o5pNdmAz","type":"Entry","createdAt":"2023-04-04T12:27:23.053Z","updatedAt":"2024-11-26T11:37:14.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":373,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"First name","htmlName":"firstName","type":"text","placeholder":"First name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6s0zB2lwQZz6ZhWkZQd5r0","type":"Entry","createdAt":"2022-09-29T18:54:51.900Z","updatedAt":"2024-11-26T11:36:43.185Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":234,"revision":112,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Work Email","htmlName":"emailAddress","type":"email","placeholder":"you@company.com","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3IumXBD9IQf1aCt2cTCoVh","type":"Entry","createdAt":"2023-06-23T19:25:51.253Z","updatedAt":"2024-11-26T11:36:56.805Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":212,"revision":105,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Phone","htmlName":"phone1","type":"tel","placeholder":"12 3456 7890","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5HOQnFx9120Wj4hlsjXaJn","type":"Entry","createdAt":"2022-03-12T20:19:03.843Z","updatedAt":"2024-11-26T11:37:58.388Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":374,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Company","htmlName":"company","type":"text","placeholder":"Acme, Inc","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1MS9X9RNVd6BmPN91fMsVg","type":"Entry","createdAt":"2022-09-29T19:31:39.832Z","updatedAt":"2024-11-26T11:37:05.764Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":209,"revision":104,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"What can we help you with?","htmlName":"contactComments","type":"textarea","placeholder":"Tell us how we can help. For support questions, head to github.com/contact ","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5zNCZ4hVsez1AWpp6Fga7h","type":"Entry","createdAt":"2022-03-12T20:23:32.191Z","updatedAt":"2024-11-20T14:58:44.487Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCustomerGUID","type":"hidden","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7a3HDjJcLkWmsPKHATLvna","type":"Entry","createdAt":"2022-03-12T20:24:00.556Z","updatedAt":"2024-11-20T14:58:44.527Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":18,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCookieWrite","type":"hidden","required":false,"defaultValue":"0"}}]}},"headerCTA":"Download PDF","buttonCTA":"Contact GitHub","publicationDate":"2021-11-18T00:00+00:00","hidden":false}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3l40sojEGJMh5igFg4pO2M","type":"Entry","createdAt":"2022-04-01T10:48:25.503Z","updatedAt":"2024-10-03T13:12:42.821Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{"metaDescription":"Let's talk about how you can scale and adopt GitHub Advanced Security in an auotmated and structured fashion"}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5R9zfL5sHOvIqOX4WnG1mJ","type":"Entry","createdAt":"2024-01-11T21:00:30.758Z","updatedAt":"2024-11-26T10:53:17.315Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":85,"revision":44,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"github-advanced-security","label":"GitHub Advanced Security"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"fNb7i6UoERhTCKJjAX5In","type":"Entry","createdAt":"2023-08-24T13:17:34.331Z","updatedAt":"2024-02-21T16:26:43.899Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/security/software-development-strategy-essentials","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2wISrmv28B41zG1Gh1eveQ","type":"Entry","createdAt":"2022-03-13T20:54:57.423Z","updatedAt":"2024-10-03T12:37:26.070Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":61,"revision":18,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"Resource Page for /security/software-development-strategy-essentials","path":"/security/software-development-strategy-essentials","title":"Secure software development strategy essentials","description":"Trust is the foundation of the relationship between software companies and their customers. The ability to prevent sensitive data from falling into the wrong hands is a cornerstone of this trust.","body":"## Introduction\n\nGlobally, governments have responded with a variety of regulatory frameworks obligating companies to protect sensitive customer data, with severe sanctions imposed on firms that fail to do so. Failure to properly safeguard data can have profound and lasting impact on a company’s reputation and their bottom line.\n\nTo make matters more complex, software has become a central component of businesses everywhere and will continue to increase in importance. However, strict regulatory and compliance requirements can govern the way teams build software, from the processes they follow to the tools they use. These requirements are often prohibitive enough to compromise performance and stifle innovation, particularly for companies in highly regulated industries, such as healthcare, government, and financial services.\n\nThe good news is secure development doesn’t have to be a barrier to collaboration or innovation. Businesses today are uniquely positioned to create impactful, forward-thinking user experiences, and many of them are doing just that. Thousands of organizations are using GitHub to free their workflows from insular development and build secure processes that give engineering teams the flexibility to do their best work. With consumer expectations higher than ever and increased pressure to lower costs, efficient, collaborative, and secure workflows can help teams shift focus to where it matters most: Building the best, most innovative software for their customers.\n\n**In this guide, we’ll outline the unique regulatory and technical challenges that software companies face, how to address them, and how GitHub can help.**\n\n## Safeguarding customer data\n\nToday, customers share some of their most sensitive data with companies in online transactions and other data exchanges. Security teams are engaged in a constant arms race with those trying to obtain this data for criminal purposes—from individual hackers to state actors deploying considerable skill and resources in their efforts to undermine security. Fortunately, there are best practices and tools that can help companies secure their development processes and keep sensitive data safe.\n\nThere is no single solution or approach that can guarantee security. Instead, effective security relies on a layered approach, enforcing checks and safeguards at multiple points across data paths and workflows. This layered approach includes a combination of tools, practices, and culture.\n\n## Build a culture of security\n\nA corporate culture that places security at the center of everything is key to enforcing security policies at scale. Creating a security culture means building processes that make everyone’s job. Examples include regular training on secure practices, highlighting the danger of social paths to infiltration like phishing attacks, as well as technical means. Specific best practices include:\n\n- Enforcement of password policies, including complex passwords, regular password changes, and the use of password managers and generators to enhance password security\n- Use of two-factor authentication\n- Education and training regarding the dangers of public networks, as well as the physical protection of devices like laptops, tablets, and cell phones\n- Use of VPNs to secure access to internal corporate networks\n\n### Always encrypt data\n\nOne of the best ways to avoid unauthorized access to data is encryption. Even if a bad actor obtains access to data transmission, strong encryption can render that success of little or no value. Again, employing a layered approach is most effective when implementing an encryption strategy. This means:\n\n- Encrypting data in transit when it’s being transmitted between a permanent store and an end user\n- Encrypting data ‘at rest’ in the databases where it’s stored\n\n#### Encryption in transit\n\nAs a standard practice, any web-based effort should employ end-to-end encryption using modern encryption protocols such as TLS. TLS helps secure communication using strong, certificate-based encryption that can be essentially unbreakable in any practical sense. TLS also verifies each party in a network transaction, preventing ‘man-in-the-middle’ attacks, where a bad actor poses as a trusted partner in a transaction. Services like LetsEncrypt have greatly reduced the cost and complexity of implementing effective TLS and obtaining the required certificates.\n\n#### Encryption at rest\n\nSome applications provide encryption services at the software layer. This sort of encryption is better than none but can bring significant costs in terms of complexity and reduced performance. Encryption solutions that run as close to the storage hardware as possible, such as filesystem encryption or hardware appliance level encryption can provide a transparent layer of encryption for all applications.\n\n#### Encryption with GitHub\n\nAll communication to and from our self-hosted solution GitHub Enterprise Server is protected by TLS with the option to use LetsEncrypt for inexpensive and simple certificate maintenance. GitHub also secures communication between Git clients used by developers and the server using SSH. Both are strong cryptographic protocols that present robust barriers to unauthorized interception or leakage of sensitive data.\n\n### Adopt strong identity management practices\n\nThe more passwords users have to remember, the more likely they are to default to insecure practices like writing passwords down or reusing easy-to-remember (and thus easy to crack) passwords. Using a centralized identity management system like LDAP coupled with a Single Sign On (SSO) solution can greatly reduce the number of passwords users have to manage, making it easier for them to follow sound password management practices.\n\n#### Using github with identity management systems\n\nGitHub Enterprise supports authentication and authorization using a variety of identity management solutions like Active Directory and LDAP. GitHub also supports SAML, which allows enterprises to provide a Single Sign On experience for users\n\n### Prevent database attacks\n\nData entering an organization can be a dangerous vector that bad actors use to attempt to gain access to your systems. Many of these strategies rely on passing dangerous payloads to poorly designed systems, exploiting flaws to gain control. SQL injection is a classic example, occuring when a bad actor intentionally appends SQL code to seemingly harmless data like a customer name in a web application. Flaws in the underlying software can result in arbitrary execution of this code, resulting in data being unintentionally returned to the user. These attacks are particularly dangerous because they may not cause an error or other event that might attract the attention of IT administrators overseeing security.\n\nAgain, a layered approach is most effective in ensuring that only valid data enters your environment. This begins with the code in the user interface and extends throughout the datapath through middleware to underlying data stores. Building validation into the code at each step can dramatically reduce your vulnerability to these sorts of attacks. A combination of frequent manual and automated reviews and tests are critical to supporting this effort.\n\n\u003caside\u003e\n \u003ch4\u003eThree ways you can prevent common vulnerabilities:\u003c/h4\u003e\n \u003col\u003e\n \u003cli\u003eOnly accept validated data into production systems\u003c/li\u003e\n \u003cli\u003eMonitor systems for errors and edge cases\u003c/li\u003e\n \u003cli\u003eRestrict access to data systems of records as much as possible by adopting an identity management system\u003c/li\u003e\n \u003c/ol\u003e\n\u003c/aside\u003e\n\n### Segregate sensitive data\n\nThe fewer places sensitive data exists, the fewer opportunities (or less “surface area”) attackers have available to exploit. Reducing surface area means implementing practices like storing passwords in a password manager rather than entrusting them to individuals and never committing passwords, access/API tokens, encryption keys, and other sensitive data to publicly accessible repositories.\n\nSensitive data should *never* be used or stored in non-production systems. Of course, teams might require large amounts of data that reliably mimic the real thing for testing, tempting some engineers to ‘refresh’ development and testing environments with production data. Instead of using production data, consider using a tool that allows you to configure and then generate large sets of dummy data. These allow reliable, realistic testing without risking sensitive information.\n\n#### Preventing sensitive data from reaching repositories with pre-receive hooks\n\nIn addition to storing sensitive data separately, you can prevent the inadvertent (or deliberate) committing of protected data to repositories with **pre-receive hooks** — simple scripts that run in an isolated environment on the GitHub appliance. These scripts are triggered *before* code is pushed to GitHub to examine commits, identify sensitive information, and prevent it from\nbeing added to your repositories.\n\nAfter examining code, pre-receive hooks return only one of two possible values: success, or failure. If it fails, developers will see a message informing them that their commit failed, along with any other useful information your team chooses to include. The code is committed to the repository only if the pre-receive hooks succeeds. The result? No unwanted code makes it to your repositories, protecting your company from violations, liability threats, and potential regulatory penalties.\n\n## Enforce protections on source code\n\nEffective security requires controlling access to sensitive information and the source code for the software that manages it. Granular controls mean you can effectively protect this information without creating a security-bound environment that denies access too comprehensively. GitHub can support your access policies with **protected branches**. Protected branches help maintain the integrity of your code by limiting several features of Git on any branch an administrator chooses to protect. For example, administrators can restrict who can post to a branch to specific users and teams programmatically. They can also disable force pushes that might change or delete code on certain branches. Additional safeguards include:\n\n- Preventing deletion of a branch\n- Preventing code which fails automated testing and Continuous Integration (CI) checks from being merged\n- Requiring manual, auditable reviews from one or more people\n- Specifying 'code owners' for any part of a codebase and requiring their review\n\n\u003caside\u003e\n \u003ch4\u003eSteps you can take to protect your customer’s most important information:\u003c/h4\u003e\n \u003cul\u003e\n \u003cli\u003eUse secure connections everywhere (no excuses!) and only transfer data using protocols like SSH and SFTP\u003c/li\u003e\n \u003cli\u003eNever commit passwords, access/API tokens, encryption keys, and more to publicly accessible repositories\u003c/li\u003e\n \u003cli\u003eUse protected branches and pre-receive hooks to account for human error and protect sensitive data from making it to production\u003c/li\u003e\n \u003cli\u003eUse an identity solution to restrict access and make sure only the right people have access to sensitive data\u003c/li\u003e\n \u003c/ul\u003e\n\u003c/aside\u003e\n\n## Securing the entire development process\n\nYour software codebase and the development processes that shape the way your team builds are at the center of a layered security strategy. As developers work together and contribute changes, it’s important to put certain safeguards in place through a combination of best practices and GitHub features that make sure the code that reaches production is secure.\n\n### Include legacy core systems\n\nTools like mainframes remain central to some companies' operations more than 50 years after their initial introduction. These systems provide unparalleled capabilities but can also pose unique challenges to secure. Development teams should periodically evaluate all legacy systems and balance the cost of updating them against the potential risks of causing a security breach. Replacing a legacy system may not seem cost-effective until the threat of fines in the billions of dollars or a devastating security breach destroying public goodwill are included in the equation.\n\n#### Selecting a mainframe system\n\nGitHub’s partner ecosystem includes many vendors producing, selling, and maintaining mainframe systems. For example, IBM recently announced extensions for Git, the technology underpinning GitHub, that allow modern DevSecOps practices to be applied to mainframe development workflows. Find integrations to power your GitHub.com workflow on [GitHub Marketplace](https://github.com/marketplace) or learn more about which apps work with our self-hosted solution [GitHub Enterprise Server](https://github.com/works-with).\n\n### Automate processes to prevent bugs and errors\n\nManual oversight is a critical component of an effective, layered security strategy. However, overreliance on people can be dangerous. People get tired, become distracted, or simply make mistakes. Put people to work where their skills are most important, and delegate repetitive, tedious, yet still critical tasks to machines. Your team can leverage fully automated **Continuous Integration and Delivery (CI/CD)** in your GitHub workflows.\n\nCI/CD tools test and evaluate your code every single time a commit is pushed to a repository. With CI/CD in place, GitHub can test new code with existing production code to ensure the proposed changes work as intended and do not introduce security flaws into existing systems. These tests can also extend to examining all the code that your code depends on (its dependencies). Implementing automation isn’t difficult—and it can yield immediate and measurable results. In a 2017 study, the IEEE found that organizations that implemented automated dependency management, for example, had 60 percent fewer security vulnerabilities in their delivered software than those which did not.\n\n\u003caside\u003e\n \u003ch4\u003eOrganizations that implemented automated dependency management, for example, had \u003cem\u003e60 percent fewer\u003c/em\u003e security vulnerabilities in their delivered software than those which did not.\u003c/h4\u003e\n\u003c/aside\u003e\n\n#### Integrating CI/CD with GitHub\n\nIntegrating CI/CD is easy with GitHub, and it won’t affect developers’ existing workflows unless an automated test result requires them to take action. The less intrusive automation is for developers, the more likely it is to be widely adopted and its benefits felt across an organization.\n\nGitHub integrates with a variety of CI tools like Jenkins, Travis, and CircleCI. These automatically fetch code from a GitHub repository every time code is pushed, run tests, and return the results to GitHub with either a pass/fail status. They also return notifications on the status of each test, so developers can see where their code is failing. And with the Checks API, teams can build sophisticated custom tools for CI that make feedback seamless and richly informative.\n\nYou and your team can decide whether or not you’d like the results of CI tests to prevent code from getting merged into the code base or simply alert developers without taking action. If CI statuses are required, the pull request can only be merged when all required CI jobs complete. If you choose to prevent merging, the pull request can’t be merged until the required tests return successfully.\n\n\u003caside\u003e\n \u003ch4\u003eIntegrating security tools and workflows\u003c/h4\u003e\n \u003cp\u003eHundreds of tools integrate with GitHub—and many of them can help you keep your code and customer data safe.\u003c/p\u003e\n \u003cul\u003e\n \u003cli\u003e\n \u003cstrong\u003eCI:\u003c/strong\u003e CI tools like \u003ca href=\"https://travis-ci.org/\"\u003eTravis CI\u003c/a\u003e, \u003ca href=\"https://circleci.com/\"\u003eCircleCI\u003c/a\u003e, and \u003ca href=\"https://www.appveyor.com/\"\u003eAppVeyor\u003c/a\u003e automatically build and test code as you push it to GitHub, preventing bugs from being deployed to production\n \u003c/li\u003e\n \u003cli\u003e\n \u003cstrong\u003e\u003ca href=\"https://developer.github.com/v3/checks/\"\u003eThe Checks API:\u003c/a\u003e\u003c/strong\u003e Teams can create sophisticated custom tools that report on exactly the data and feedback you need\n \u003c/li\u003e\n \u003cli\u003e\n \u003cstrong\u003eError reporting:\u003c/strong\u003e Tools like \u003ca href=\"https://snyk.io/\"\u003eSnyk\u003c/a\u003e, \u003ca href=\"https://sentry.io/welcome/\"\u003eSentry\u003c/a\u003e, and \u003ca href=\"https://dependabot.com/\"\u003eDependabot\u003c/a\u003e help your team find, fix, and prevent vulnerabilities\n \u003c/li\u003e\n \u003cli\u003e\n \u003cstrong\u003eCode quality:\u003c/strong\u003e \u003ca href=\"https://codeclimate.com/\"\u003eCode Climate\u003c/a\u003e and \u003ca href=\"https://www.codacy.com/\"\u003eCodacy\u003c/a\u003e automate reviews with security and quality checks to prevent human error and streamline your team’s code review processes\n \u003c/li\u003e\n \u003c/ul\u003e\n \u003cp\u003eReady to see what kinds of tools are available to your team? Visit GitHub Marketplace at \u003ca href=\"https://github.com/marketplace\"\u003egithub.com/marketplace\u003c/a\u003e or browse \u003ca href=\"https://github.com/works-with\"\u003egithub.com/works-with\u003c/a\u003e\u003c/p\u003e\n\u003c/aside\u003e\n\n### Enforce manual reviews with required code review\n\nAutomation is important, but manual review of code will always remain a critical component of your security strategy. The more eyes on a given codebase, the more likely errors or vulnerabilities are likely to be detected. Reviews also serve a valuable function beyond security, helping ensure that institutional knowledge is shared and providing learning and mentoring opportunities for developers of all skill levels. The result of regular, organization sanctioned reviews is a codebase that is not only more secure but also healthier and more consistent.\n\nGitHub provides a flexible framework for mandating code reviews. You can:\n\n- Require reviews from one or more users with write access to the repository containing the changes\n- Require additional review and approval by one or more **code owners**. Code owners can be any combination of individual users or teams assigned specific responsibility for a section of a codebase, a particular technology, or any combination of the two\n- Empower reviewers to provide detailed, line-by-line feedback on any proposed changes\n- Ensure that all reviews are logged and auditable in the future\n\n\u003caside\u003e\n \u003ch4\u003eThree steps to take to help your team prevent bugs and errors:\u003c/h4\u003e\n \u003col\u003e\n \u003cli\u003eBuild in automated security scanning to reduce human error, test for weaknesses that may not be introduced otherwise, and save developers time\u003c/li\u003e\n \u003cli\u003eIntegrate automation directly into your team’s GitHub workflow with status checks\u003c/li\u003e\n \u003cli\u003eEnsure all of your team members feel an equal and shared responsibility for building and maintaining secure software\u003c/li\u003e\n \u003c/ol\u003e\n\u003c/aside\u003e\n\n### Audit and compliance-proof your workflow\n\nThe regulatory standards under which some companies work today require a robust logging and auditing capability. Not only do teams need to create an effective security strategy, they also have to prove they’ve done so to regulators. GitHub provides flexible and powerful logging, auditing, and reporting frameworks to help ensure compliance and the ability to prove it.\n\n#### Audit logging\n\nGitHub Enterprise maintains comprehensive logs of user and system activity. Audited activity includes every `git push` operation, including who initiated the push, their IP address, and repositories affected by the operation. Logs can be forwarded to an external system (like Logstash or Splunk) for analysis, reporting, and storage, ensuring compliance with regulatory requirements.\n\n#### Archiving repositories\n\nRepositories that are no longer maintained can be archived and set to ‘read-only’ mode. This ensures that no new code can be committed to the repository while still allowing users to view its content.\n\n#### Blocking force pushes\n\nGit allows developers to rewrite commit history by ‘force pushing’ changes. While sometimes necessary in order to fix mistakes, this capability presents a challenge when regulations require data to be immutable. GitHub Enterprise allows administrators to block force pushes for individual repositories or for the entire appliance, ensuring commit history can never be rewritten.\n\n#### Preventing users from deleting repositories\n\nThe ability to delete repositories can be restricted to administrators.\n\n### Move security all the way left\n\nIn the past, security was all too often an afterthought. In fact, the protocols which run the internet were not designed with security in mind _at all_. Boltedon aftermarket security is better than nothing, but far from sufficient in today’s frenzied threat environment. To be effective, security must be built into every software project from its very inception. Moving security left means shifting security from the right-hand side of your timeline, near delivery, all the way to the left, at the beginning. This ensures that security remains front and center throughout the entire product lifecycle.\n\nInvolving security teams early can also influence design, development, and maintenance decisions before they become too difficult and expensive to change. This advice is simple enough, but process means very little if leadership and engineering teams aren’t on board. Secure development requires everyone to adopt an effective security culture.\n\n#### Creating a security culture\n\nDevSecOps is a way of thinking about security throughout the development cycle and distributing it across teams and roles. It no longer makes sense for security teams to join the process after an application is built, only to discover exploitable flaws. With security experts closely aligned from the start, teams can create collaborative processes that proactively support security as they build.\n\nDevSecOps principles may require organizations to shift their team culture in addition to their infrastructure, but more reliable software and fewer surprises are worthwhile results. Some companies even invite security specialists into scrum teams to make sure it’s a priority throughout the process.\n\n## Customer story: Anaplan\n\nAnaplan helps businesses make smart, data-driven decisions with advanced modeling software. With a focus on speed, flexibility, and integrity, Anaplan supports planning at more than 500 companies— helping them stay nimble, discover opportunities, and plan for their futures.\n\nBehind its smart platform is a huge amount of data. Anaplan's 150+ developers need to create a platform that’s both flexible enough to make that data meaningful to businesses across industries, while ensuring that data is secure enough to keep it private. Their customers trust Anaplan to store sensitive financial plans in its own data centers. As a result, the company has rigorous compliance and security requirements in place to ensure the safety and privacy of regulated financial data.\n\nTo help their teams build a flexible, forward-thinking platform, Anaplan uses GitHub Enterprise Server.\n\n\u003e Compliance is a very big deal, and we built a lot of tooling to make sure we’re bulletproof. All commits are tagged with JIRA IDs that link everything together, including all of our developer tools. GitHub has made a huge impact on compliance, while helping us become more transparent.\n\n\u003csmall\u003e\u003cstrong\u003eJon Sandles,\u003c/strong\u003e Release Manager, Anaplan\u003c/small\u003e\n\nAt the heart of the Anaplan’s build and deployment pipelines are a set of automated tools that leverage the GitHub Enterprise API to regularly query and poll, and produce reports and alerts across all repositories. These keep the product team in tune with what's going on by emailing developers, creating reports in Confluence, and updating JIRA and Slack channels.\n\nProduct Managers are informed if code is checked into the wrong repositories against incorrect JIRA projects. Engineers are kept informed if pull requests are left open for too long. Code is scanned continuously by tools like Sonar and Checkmarx; deployment appliances like Chef scripts get the same treatment. Everything that goes to production follows the same pipelines.\n\nAt any point in time, especially near production deployment, the release and program management team are fully up to date on codebase compliance and readiness.\n\n\u003caside\u003e\n \u003ch4\u003eFour key features convinced Anaplan that GitHub offered the best solution:\u003c/h4\u003e\n \u003col\u003e\n \u003cli\u003e\n \u003cstrong\u003eProtected branches:\u003c/strong\u003e Developers can ensure code that processes data comes from a known source and gets reviewed\n \u003c/li\u003e\n \u003cli\u003e\n \u003cstrong\u003eHard tokens:\u003c/strong\u003e Developers can keep access tightly controlled by using two-factor authentication with hard tokens behind a VPN\n \u003c/li\u003e\n \u003cli\u003e\n \u003cstrong\u003eJIRA integration:\u003c/strong\u003e Developers can attach all pull requests and commit comments to JIRA IDs that document whether changes are approved and tested\n \u003c/li\u003e\n \u003cli\u003e\n \u003cstrong\u003eDocumentation versioning:\u003c/strong\u003e Programmers can create and host documentation as close as possible to the applications\n \u003c/li\u003e\n \u003cli\u003e\n \u003cstrong\u003eSecurity:\u003c/strong\u003e the platform is hosted on internal servers; Enterprise Server uses the enterprise directory to manage authentication and logs all user and system activity\n \u003c/li\u003e\n \u003c/ol\u003e\n\u003c/aside\u003e\n\n## Summary\n\nKeeping data safe has never been more critical to the success, even survival of your business. Implementing effective security might seem overwhelming, but it doesn’t have to be. One of the advantages of a layered defense is to break up the task of implementing security into multiple, less daunting sub-projects. The most important thing to do is to start, or if you’ve started, continue to test, examine, question, and improve. Attackers never rest, and neither can you.\n\nPart of the challenge in implementing effective security lies in balancing it with the freedom that software developers need to innovate, thrive, and be productive. Too little security is simply ineffective. Too much, on the other hand, can stifle creativity or encourage people to avoid your security efforts altogether. Tools like GitHub provide you with the controls you need to help find that balance for your organization.\n\nUltimately our goal is to help you transform your perception of security beyond a threat and into an opportunity to build customer satisfaction, attract new customers, and further differentiate your business. Good security pays off in customer trust—and partners like GitHub can help you on your way to an effective security strategy.\n\n---\n\n\u003caside\u003e\n \u003ch4\u003eKey Takeaways:\u003c/h4\u003e\n \u003col\u003e\n \u003cli\u003eYour data are under constant attack. A breach can have very serious consequences for your business and, increasingly, for you personally\u003c/li\u003e\n \u003cli\u003eThere is no magic fix for security. Instead, a layered defense comprised of multiple tools, processes, and practices is much more resilient and effective\u003c/li\u003e\n \u003cli\u003eEffective security requires an effective security culture. Security must be a stakeholder in every important initiative and decision\u003c/li\u003e\n \u003cli\u003eEncrypt everything — no exceptions\u003c/li\u003e\n \u003cli\u003eUse a multi-layered approach to vet and validate all data entering your systems to prevent malicious attacks like SQL injection\u003c/li\u003e\n \u003cli\u003ePlan for and include older, but still mission-critical systems like mainframes. Include the possible costs in terms of fines, civil liability, and lost goodwill when evaluating and upgrading legacy tools\u003c/li\u003e\n \u003cli\u003eLeverage automation where you can, particularly for software testing\u003c/li\u003e\n \u003c/ol\u003e\n\u003c/aside\u003e\n\n---\n\n#### We’re here to help! GitHub supports building robust, secure code. Ready to explore how GitHub fits into your secure development process? Get in touch!","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"JrNlggcqorMfeTY21CXxR","type":"Entry","createdAt":"2022-03-13T20:53:33.289Z","updatedAt":"2022-03-17T16:53:30.792Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"article"}},"locale":"en-US"},"fields":{"attachment":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7feXBKtzaXTElhGgP82bjv","type":"Asset","createdAt":"2021-11-19T17:25:25.885Z","updatedAt":"2022-03-12T22:50:40.513Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":2,"locale":"en-US"},"fields":{"title":"/downloads/GitHub_Guide_secure_software_development.pdf","description":"GitHub_Guide_secure_software_development","file":{"url":"//assets.ctfassets.net/wfutmusr1t3h/7feXBKtzaXTElhGgP82bjv/46700a35aab096ba8604b3a66d43dd06/_downloads_GitHub_Guide_secure_software_development.pdf","details":{"size":1339223},"fileName":"/downloads/GitHub_Guide_secure_software_development.pdf","contentType":"application/pdf"}}}}},"gated":false,"sfCampaignID":"7015c000001SNN7AAO","campaign":"Resources_Contact_Us","contentForm":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3qHQ6eSp20iGQrFIfaBJnn","type":"Entry","createdAt":"2022-09-29T19:33:25.277Z","updatedAt":"2024-11-26T11:30:01.409Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":248,"revision":113,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"form"}},"locale":"en-US"},"fields":{"name":"Form_Ungated_Contact","title":"Wondering how GitHub can help your business?","subtitle":"Tell us more about your needs","eloquaFormName":"ContactUs_TemplateForm","formCTA":"Contact GitHub","formElements":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Euizanl72D7hjUPBu1cz4","type":"Entry","createdAt":"2023-04-04T12:27:44.815Z","updatedAt":"2024-11-26T11:37:30.225Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":372,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Last name","htmlName":"lastName","type":"text","placeholder":"Last name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6FMPEpNvfZnVg5o5pNdmAz","type":"Entry","createdAt":"2023-04-04T12:27:23.053Z","updatedAt":"2024-11-26T11:37:14.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":373,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"First name","htmlName":"firstName","type":"text","placeholder":"First name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6s0zB2lwQZz6ZhWkZQd5r0","type":"Entry","createdAt":"2022-09-29T18:54:51.900Z","updatedAt":"2024-11-26T11:36:43.185Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":234,"revision":112,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Work Email","htmlName":"emailAddress","type":"email","placeholder":"you@company.com","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3IumXBD9IQf1aCt2cTCoVh","type":"Entry","createdAt":"2023-06-23T19:25:51.253Z","updatedAt":"2024-11-26T11:36:56.805Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":212,"revision":105,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Phone","htmlName":"phone1","type":"tel","placeholder":"12 3456 7890","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5HOQnFx9120Wj4hlsjXaJn","type":"Entry","createdAt":"2022-03-12T20:19:03.843Z","updatedAt":"2024-11-26T11:37:58.388Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":374,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Company","htmlName":"company","type":"text","placeholder":"Acme, Inc","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1MS9X9RNVd6BmPN91fMsVg","type":"Entry","createdAt":"2022-09-29T19:31:39.832Z","updatedAt":"2024-11-26T11:37:05.764Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":209,"revision":104,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"What can we help you with?","htmlName":"contactComments","type":"textarea","placeholder":"Tell us how we can help. For support questions, head to github.com/contact ","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5zNCZ4hVsez1AWpp6Fga7h","type":"Entry","createdAt":"2022-03-12T20:23:32.191Z","updatedAt":"2024-11-20T14:58:44.487Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCustomerGUID","type":"hidden","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7a3HDjJcLkWmsPKHATLvna","type":"Entry","createdAt":"2022-03-12T20:24:00.556Z","updatedAt":"2024-11-20T14:58:44.527Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":18,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCookieWrite","type":"hidden","required":false,"defaultValue":"0"}}]}},"headerCTA":"Download PDF","publicationDate":"2018-11-18T00:00-05:00","hidden":false,"marketoCampaign":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2ywGzPlFH9kTdiOBF75ggA","type":"Entry","createdAt":"2023-09-15T23:09:46.917Z","updatedAt":"2024-11-20T14:58:44.542Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":7,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"marketoCampaign"}},"locale":"en-US"},"fields":{"title":"CO-GHG-CONTACT-FY23-10Oct-01-WW-Resources-Contact-Request/406214","cDLProgramName":"406214","source":"Contact Request","formFields":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6z2cGa4cuvoWqGxS3Ejhv4","type":"Entry","createdAt":"2023-09-12T16:31:47.760Z","updatedAt":"2024-11-26T11:32:18.468Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":127,"revision":59,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"sFDCLastCampaignStatus","htmlName":"sFDCLastCampaignStatus","type":"hidden","required":false,"defaultValue":"Responded"}}],"active":true}}}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"56kYutrfwbg3ClHfKJIdD5","type":"Entry","createdAt":"2022-03-13T20:54:09.094Z","updatedAt":"2022-03-13T20:54:09.094Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"ZIILWrPwEMcXhCTJ29RDT","type":"Entry","createdAt":"2023-08-24T13:15:45.264Z","updatedAt":"2024-02-21T16:26:03.224Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/security/supply-chain-security","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3M22BGTkXNxgehWeMILynZ","type":"Entry","createdAt":"2022-07-14T16:25:36.951Z","updatedAt":"2024-10-03T12:36:19.829Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":707,"revision":67,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"Resource Page for /security/supply-chain-security","path":"/security/supply-chain-security","title":"How developer-first supply chain security helps you ship secure software fast","description":"Discover why supply chain security is needed and how GitHub’s supply chain security tool can help you ship secure software quickly. ","body":"Are you looking to secure your code but don’t want extra security steps slowing you down? These days, developers are often faced with a tough choice—to ship secure software slowly or insecure software quickly. Here at GitHub, we believe that you shouldn’t have to choose between one or the other. Read on to explore why supply chain security is needed, how dependencies are interwoven into your code, and how GitHub’s supply chain tool, Dependabot, can help.\n\n|This page will touch on the following topics:|\n| ---------- |\n| Software supply chain|\n| Open source vulnerabilities|\n| Open source security|\n| Software dependencies|\n| Types of dependencies|\n| Dependency changes|\n| Managing dependencies|\n| Software composition analysis (SCA)|\n| Benefits of SCA|\n| What is Dependabot?|\n| Dependabot features|\n| Turning on Dependabot|\n| Dependabot and other GitHub tools|\n\n## What is the software supply chain?\n\nSoftware supply chain is a popular phrase that refers to how your software gets built using all the innersource and open source dependencies in your codebase. Maybe you're creating a JavaScript app that uses dependencies from npm, or maybe you're building a compiled app written in C# that uses a mix of innersource and Nugget dependencies. The threat model for each of these apps is different because of the software supply chain they depend on. GitHub is here to help you understand the software you use and keep it safer using innovative products like Dependabot.\n\n## What are open source vulnerabilities?\n\nOpen source vulnerabilities are security risks that live in your open source components. Most vulnerabilities result from well-intentioned mistakes involving a lack of security functionalities, non-ideally written code or weak integration of components. Unfortunately, they can easily be exploited by an attacker. Malicious actors can use your code's vulnerabilities to damage your systems, steal your data, or abuse your resources. And exploiting just one weakness can have profound repercussions by enabling hackers to leapfrog to other vulnerable services inside your environment.\n\n_Vulnerabilities can bite you hard when you're not looking—and compromise your entire project. Today's most common types of vulnerabilities include:_\n\n- **SQL injection**\nThis is a code injection attack that's triggered when a bad actor adds harmful logic into your SQL statements through user input. The vulnerability stems from not performing input sanitization or performing it incorrectly. Implications include unauthorized data access, modification and data loss, and changes to an application's content and behavior.\n\n- **Command injection**. \nThis is another code injection attack that occurs when a malicious actor inserts a command into an application that will then be executed in the host system using the system's privileges. A command injection attack can compromise the application, its data, connected servers, and other infrastructure.\n\n- **Cross-site scripting (XSS)**. \nThis is a web injection attack where malicious scripts are injected into otherwise benign websites. Due to JavaScript scripts running on the victim's browser, XSS attacks are able to steal sensitive data like authentication cookies. This is common on public websites, where attackers can target the website's visitors by adding their own ads and phishing prompts.\n\n- **Cross-site request forgery (CSRF).** \nThis attack forces the end-user to execute unwanted actions on a web application in which they're currently authenticated. Unwanted actions might include fund transfers or a change of personal information. Basically, these attacks take advantage of the target site's trust for requests initiated by authenticated users that in reality are initiated from elsewhere.\n\n---\n\n*To learn more about the most frequent types of vulnerabilities out there, visit our [vulnerability blog post][1].*\n\n---\n\n## What is open source security?\n\nOpen source security is a methodology that provides you with better visibility into the open source inventory of your applications. With open source security, you're able to easily identify all of your direct dependencies, indirect dependencies, and the slew of security information related to each one. Tracking these things manually is too time-consuming and is commonly done via software composition analysis (SCA), which we'll explore later on.\n\n## What are software dependencies?\n\nA software dependency is a package or code library that is reused in a new piece of software. Using open source ensures you can focus on the differentiated parts of your project, and build on the solid foundations of the broader community.\n\nThese days, nearly all software projects have some form of dependencies. And the amount is not small—it's estimated that [60-90% of codebases][2] are composed of open source components. Of course, if there are security issues in any of this code, it will affect the final product, just like security issues in proprietary code would.\n\n## What are the different types of dependencies?\nThere are two types of software dependencies: direct and indirect. Direct dependencies are libraries or packages that your code calls directly. Indirect dependencies are libraries or packages that your dependencies call. In other words, they're dependencies of dependencies.\n\nWhile both types of dependencies require management to control security risks, indirect dependencies require extra consideration because it's not immediately obvious when they're at play. Indirect dependencies become nested inside other dependencies, forming a hidden but complex dependency tree that can be easily missed when attempting to secure your supply chain.\n\nAt a glance: The two types of dependencies\n\n- **Direct dependencies** are libraries and packages that your code calls directly\n- **Indirect dependencies** are libraries and packages that your dependencies call\n\nSecuring both types is crucial, but it's harder to detect transitive dependencies.\n\n## How has the dependency landscape changed over time?\n\nBack in the day, downloading and installing a library was tedious work. Because of this, reusing smaller packages was impractical. But over the past two decades, tools like [Maven][3] and [npm][4] made consuming and working with small packages easier. Ever since, the number of packages available for developers has exploded. Software packages are now a significant part of modern applications.\n\nHowever, the industry is now being faced with a slew of security issues and problems. As mentioned, if a bug is present in a dependency, that can affect the whole app. Plus, dependencies can quickly become outdated, limiting the quality of the software that calls them, or even causing the entire application to fail.\n\nWhile using dependencies can help you build software quicker, there are a number of issues in dependencies that can go awry, including:\n\n- Security vulnerabilities that impact your entire program\n- Outdated code that compromises the quality of your software\n\n## What happens when organizations don't manage dependencies?\n\n There can be a lot of frustration when you've installed software packages that depend on specific versions of other software packages—and solving for one dependency breaks the compatibility of another. Like a game of whack-a-mole, this will put you in a never-ending mess of dependency pain.\n\nThat's why it's important for you to effectively manage your dependencies all throughout the software development life cycle (SDLC).\n\n## What is software composition analysis (SCA)?\n\nSCA is an automated process that identifies the open source components in your codebase. Such tools inspect package managers, source code, manifest files, container images, binary files, and more. These components are compared against the [GitHub Advisory Database][5], which includes information from the [National Vulnerability Database (NVD)][6] and other databases.\n\n**What are vulnerability databases?**\n\nVulnerability databases store information about known and common vulnerabilities. The NVD is the US government\u0026#39;s vulnerability repository and is widely used in the open source community. GitHub has its own [GitHub Advisory Database][5], which includes advisories from all over the open source world.\n\n**What supply chain components do SCA tools inspect?**\n\n- Package managers\n- Manifest files\n- Binary files \n- Source code\n- Container images\n- Approved components\n- Developer downloads\n- Code reuse\n- Commercial apps\n- Third-party libraries\n- Outsourced development\n\n## What are the benefits of SCA?\n\nWhen it comes to securing your supply chain, SCA tools offer security, speed, and reliability. Manual tracking of open source components no longer works, given the vast amount that\u0026#39;s used these days. Plus, the increasing prevalence of cloud-native applications and more-complex technologies, make dependable SCA tools mandatory.\n\n\u003e Never force a human to do what a robot can. \n\u003csmall\u003e\u003cstrong\u003e–Motto of the GitHub security team\u003c/strong\u003e\u003c/small\u003e\n\nAs teams build and ship software faster due to the adoption of DevOps methodologies, you need a security solution that can maintain your development velocity—just like an SCA tool.\n\nBut not all SCA tools are created equal. It\u0026#39;s best to select an SCA tool that scans open source components within containerized environments, identifies any vulnerabilities, and automatically enforces policies. Good SCA tools also have native support for the specific container registry your IT is using.\n\nWhen it comes to organizations, the SCA tool should additionally let you know whether its code communicates with the impacted library and suggest fixes when able. The tool should also identify open source libraries in the codebase that need to be patched or updated.\n\n## What is Dependabot and how can Dependabot keep my supply chain secure?\n\nDependabot is GitHub's SCA tool. Dependabot makes it easy to secure your supply chain by helping you to identify your dependencies, the vulnerabilities in those dependencies, and suggesting ways to fix, patch, or update them. The tool fits natively into your developer workflow so you can secure your supply chain in minutes.\n\nDependabot catches vulnerabilities from your dependencies in real-time, allowing you to understand:\n\n- The vulnerability data for each dependency, as published by GitHub\u0026#39;s Advisory Database\n- The impact of the vulnerability in your project—for example, if your code is making a vulnerable call\n- How to take action and fix the vulnerability with a Dependabot pull request or with another workaround\n\nDependabot also helps you keep your dependencies up-to-date with [Dependabot version updates][7]—which can help you avoid many potential vulnerabilities on your project, in the first place!\n\n\u003e Dependabot helps us write more secure code. \n\u003csmall\u003e\u003cstrong\u003e–Max Williams\u003c/strong\u003e, Principal Systems Engineer, Delivery Hero\u003c/small\u003e\n\n## What are the different features of Dependabot?\n\nDependabot includes a suite of best-in-class features, including:\n\n- [Dependency graph][8]. This graph identifies all upstream dependencies and public downstream dependents of a repository or package. You can view dependencies and any detected vulnerabilities in your dependency graph.\n\n- [Dependabot alerts][9]. These alerts inform you of repositories affected by newly discovered vulnerabilities based on GitHub's dependency graph and the GitHub Advisory Database.\n\n- [Dependabot security updates][10]. These updates are automated pull requests sent to you from Dependabot to update a dependency to the minimum version that resolves a known vulnerability.\n\n- [Dependabot version updates][11]. These updates check for new versions of your dependencies and suggest updates—all on the [configurations][7] you set.\n\n## How do I turn on Dependabot?\n\nTurning on Dependabot is easy. Simply follow these five steps:\n\n1. Go to GitHub.com.\n2. Navigate to the main page of the repository.\n3. Under your repository name, click Settings.\n4. On the left sidebar, click Code security and analysis.\n5. Finally, click the Enable button for Dependency graph and Dependabot alerts. If you'd like Dependabot to help you update your dependencies, also click Enable for Dependabot security updates.\n\n---\n\n- Discover more about [securing your software supply chain on GitHub][12]*\n\n---\n\nCreated just for you, Dependabot is:\n\n- **Built for you**. You can choose how often you get notifications and what type of notifications you receive. Dependabot alerts are sorted by a \u0026quot;most important\u0026quot; calculation, which takes into account a vulnerability's impact, relevancy, and actionability to help you prioritize alerts. For example, when vulnerabilities call known vulnerable functions, that's factored in our calculation (and vulnerable function call information is also available with your Dependabot alert).\n\n- **Built from the community**. The [GitHub Advisory Database][5], which powers Dependabot alerts, is the largest database of vulnerabilities in software dependencies in the world. It\u0026#39;s maintained by a dedicated team of full-time curators and supported by contributions from the entire GitHub community.\n\n- **Forever free**. GitHub believes that free and open security data and solutions are critical to empowering the industry and to best securing our software supply chains.\n\n## How do Dependabot products work together with other GitHub security tools?\n\nAt GitHub, we provide a suite of developer-first security tools to help you find and fix vulnerabilities. While Dependabot helps you secure your supply chain, our other security products work synergistically with Dependabot to keep your code secure from nearly every angle.\n\n- _**Code scanning**_, powered by CodeQL, is a static application security testing (SAST) product that catches common patterns in your code. It can also run within your pull requests, detecting vulnerabilities before they reach your main branch. Beyond protecting your code, CodeQL teaches you what to look out for in the future, as each query contains information on the vulnerability pattern detected, including examples of vulnerable code, secure ways to implement the same code, and external references.\n\n---\n\n*- To learn more about how to get started with code scanning and CodeQL, visit our [GitHub Docs code scanning page][13].*\n\n---\n\n- _**Secret scanning**_ prevents unauthorized access and breaches. It does this by proactively searching your repositories for leaked secrets that may have accidentally been pushed into your code. This involves scanning your code for patterns from our partners, including AWS, Slack, Google Cloud, and Azure. Because scans take less than a second, we can quickly catch leaks as they occur.\n\n---\n\n*- To learn more about how to get started with secret scanning, visit our [GitHub Docs secret scanning page][14].*\n\n---\n\n- _**Security overview**_ provides a single, centralized view of the security risks in your entire organization. This is especially powerful if you're responsible for hundreds or thousands of repositories. The tool shows the known security risks, as well as unknown risks where security features haven't yet been configured.\n\n---\n\n*- To learn more about security overview, visit our [security overview Docs page][15].*\n\n---\n\nAll of these tools are part of GiHub Advanced Security (GHAS) for enterprises. GHAS natively embeds security into the developer workflow—enabling you to secure your software supply chain and proprietary code across the software lifecycle. With GHAS, automated security checks are run with every pull request. Identified security issues are then shared immediately within the familiar GitHub workflow. This empowers you to fix vulnerabilities in minutes, not the industry standard of months.\n\n---\n\n*- To learn more about GHAS, visit our [GHAS Docs page][16].*\n\n---\n\n\u003e Security is critical, but reliability is important too. We depend on GitHub to deploy our products quickly and safely. \n\u003csmall\u003e\u003cstrong\u003e–Lee Cookson\u003c/strong\u003e, Engineering Director, Dow Jones\u003c/small\u003e\n\nTo speak with a representative about how GitHub can help your organization secure your code, sign up for a [free demo][17].\n\n| Secure code without disrupting innovation | Scaling GitHub Advanced Security |\n| ---------- | ---------- |\n| GitHub Advanced Security helps you find and fix security issues in your code earlier to scale and automate your application security.\u003cbr /\u003e\u003cbr /\u003e [Learn more](https://resources.github.com/appsec/)| Let's talk about how you can scale and adopt GitHub Advanced Security in an auotmated and structured fashion. \u003cbr /\u003e\u003cbr /\u003e [Learn more](https://resources.github.com/security/scaling-github-advanced-security/)|\n\u003cbr /\u003e\u003cbr /\u003e\n\n[1]: https://github.blog/2022-05-06-todays-most-common-security-vulnerabilities-explained/\n[2]: https://debricked.com/blog/vulnerabilities-dependencies/\n[3]: https://maven.apache.org/\n[4]: https://www.npmjs.com/package/npm\n[5]: https://github.com/advisories\n[6]: https://nvd.nist.gov/\n[7]: https://docs.github.com/en/code-security/dependabot/dependabot-version-updates/about-dependabot-version-updates\n[8]: https://docs.github.com/en/code-security/supply-chain-security/understanding-your-software-supply-chain/exploring-the-dependencies-of-a-repository\n[9]: https://docs.github.com/en/code-security/dependabot/dependabot-alerts/about-dependabot-alerts\n[10]: https://github.co/security-updates\n[11]: https://docs.github.com/en/github/administering-a-repository/enabling-and-disabling-version-updates\n[12]: https://docs.github.com/en/code-security/supply-chain-security\n[13]: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/about-code-scanning-with-codeql\n[14]: https://docs.github.com/en/code-security/secret-scanning/about-secret-scanning\n[15]: https://docs.github.com/en/code-security/security-overview/about-the-security-overview\n[16]: https://docs.github.com/en/get-started/learning-about-github/about-github-advanced-security\n[17]: https://resources.github.com/demo/advanced-security/\n[18]: https://resources.github.com/appsec/\n[19]: https://resources.github.com/security/scaling-github-advanced-security/","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1HZLvIE0OlajeqGeEyLvzk","type":"Entry","createdAt":"2022-07-14T16:32:07.768Z","updatedAt":"2022-07-14T17:05:21.850Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"article"}},"locale":"en-US"},"fields":{}},"gated":false,"sfCampaignID":"7015c000001SNN7AAO","campaign":"Resources_Contact_Us","contentForm":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3qHQ6eSp20iGQrFIfaBJnn","type":"Entry","createdAt":"2022-09-29T19:33:25.277Z","updatedAt":"2024-11-26T11:30:01.409Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":248,"revision":113,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"form"}},"locale":"en-US"},"fields":{"name":"Form_Ungated_Contact","title":"Wondering how GitHub can help your business?","subtitle":"Tell us more about your needs","eloquaFormName":"ContactUs_TemplateForm","formCTA":"Contact GitHub","formElements":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Euizanl72D7hjUPBu1cz4","type":"Entry","createdAt":"2023-04-04T12:27:44.815Z","updatedAt":"2024-11-26T11:37:30.225Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":372,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Last name","htmlName":"lastName","type":"text","placeholder":"Last name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6FMPEpNvfZnVg5o5pNdmAz","type":"Entry","createdAt":"2023-04-04T12:27:23.053Z","updatedAt":"2024-11-26T11:37:14.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":373,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"First name","htmlName":"firstName","type":"text","placeholder":"First name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6s0zB2lwQZz6ZhWkZQd5r0","type":"Entry","createdAt":"2022-09-29T18:54:51.900Z","updatedAt":"2024-11-26T11:36:43.185Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":234,"revision":112,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Work Email","htmlName":"emailAddress","type":"email","placeholder":"you@company.com","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3IumXBD9IQf1aCt2cTCoVh","type":"Entry","createdAt":"2023-06-23T19:25:51.253Z","updatedAt":"2024-11-26T11:36:56.805Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":212,"revision":105,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Phone","htmlName":"phone1","type":"tel","placeholder":"12 3456 7890","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5HOQnFx9120Wj4hlsjXaJn","type":"Entry","createdAt":"2022-03-12T20:19:03.843Z","updatedAt":"2024-11-26T11:37:58.388Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":374,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Company","htmlName":"company","type":"text","placeholder":"Acme, Inc","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1MS9X9RNVd6BmPN91fMsVg","type":"Entry","createdAt":"2022-09-29T19:31:39.832Z","updatedAt":"2024-11-26T11:37:05.764Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":209,"revision":104,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"What can we help you with?","htmlName":"contactComments","type":"textarea","placeholder":"Tell us how we can help. For support questions, head to github.com/contact ","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5zNCZ4hVsez1AWpp6Fga7h","type":"Entry","createdAt":"2022-03-12T20:23:32.191Z","updatedAt":"2024-11-20T14:58:44.487Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCustomerGUID","type":"hidden","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7a3HDjJcLkWmsPKHATLvna","type":"Entry","createdAt":"2022-03-12T20:24:00.556Z","updatedAt":"2024-11-20T14:58:44.527Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":18,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCookieWrite","type":"hidden","required":false,"defaultValue":"0"}}]}},"headerImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6KjIFfi4p8DYEohiLFERbW","type":"Asset","createdAt":"2022-11-22T21:01:39.880Z","updatedAt":"2024-03-04T15:32:55.248Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":17,"revision":4,"locale":"en-US"},"fields":{"title":"Security - Light 1","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/6KjIFfi4p8DYEohiLFERbW/e2bbcfc88ebf82cf8bc9be17d86279d6/sec.png","details":{"size":105000,"image":{"width":1200,"height":630}},"fileName":"sec.png","contentType":"image/png"}}},"buttonCTA":"Contact GitHub","publicationDate":"2022-07-14T00:00-07:00","hidden":false,"rendersRichText":false,"marketoCampaign":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2ywGzPlFH9kTdiOBF75ggA","type":"Entry","createdAt":"2023-09-15T23:09:46.917Z","updatedAt":"2024-11-20T14:58:44.542Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":7,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"marketoCampaign"}},"locale":"en-US"},"fields":{"title":"CO-GHG-CONTACT-FY23-10Oct-01-WW-Resources-Contact-Request/406214","cDLProgramName":"406214","source":"Contact Request","formFields":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6z2cGa4cuvoWqGxS3Ejhv4","type":"Entry","createdAt":"2023-09-12T16:31:47.760Z","updatedAt":"2024-11-26T11:32:18.468Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":127,"revision":59,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"sFDCLastCampaignStatus","htmlName":"sFDCLastCampaignStatus","type":"hidden","required":false,"defaultValue":"Responded"}}],"active":true}}}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1WzDA9oFuIrlpQNk0K9iXV","type":"Entry","createdAt":"2022-07-14T16:49:33.466Z","updatedAt":"2022-07-14T17:04:56.750Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"10tLDwejd2LgT4MZZbXg2m","type":"Entry","createdAt":"2023-08-24T13:14:07.430Z","updatedAt":"2024-02-21T16:25:46.453Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/security/supply-chain/shipping-fast-secure-supply-chain","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5ORcIz4XFVv0cfBcGBVZng","type":"Entry","createdAt":"2022-03-12T02:29:31.372Z","updatedAt":"2024-10-03T12:38:39.930Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":65,"revision":22,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"/security/supply-chain/shipping-fast-secure-supply-chain","path":"/security/supply-chain/shipping-fast-secure-supply-chain","title":"Shipping fast with a secure supply chain on GitHub","description":"Following DevSecOps means approaching security as an ongoing part of software development—and staying up to date on the code your software depends on.","body":"\u003cdiv class=\"embed-responsive embed-responsive-16by9\"\u003e\n\u003ciframe title=\"Discussion on integrating security into developers' workflows\" src=\"https://player.vimeo.com/video/456978250\" width=\"640\" height=\"480\" frameborder=\"0\" webkitallowfullscreen mozallowfullscreen allowfullscreen\u003e\u003c/iframe\u003e\u003c/div\u003e\n\nJoin Jon Kohler, Nutanix Technical Director, and GitHub Product Manager Maya Kaczorowski for an in-depth conversation into how Nutanix uses Dependabot and the GitHub dependency graph to understand which dependencies they use, their vulnerabilities, how to patch them—and get back to work.\n\nIn this talk, we’ll cover:\n\n- What a software supply chain is and how to secure yours\n- How to identify, manage, and update your dependencies using Dependabot and GitHub’s dependency graph\n- How to report open source vulnerabilities and why","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"33sHeO4iDpT4FkSFXk6apG","type":"Entry","createdAt":"2022-03-12T02:28:56.479Z","updatedAt":"2022-03-13T22:05:45.099Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"video"}},"locale":"en-US"},"fields":{"dateRecorded":"2020-08-27T00:00-08:00","isWebcast":true}},"gated":false,"sfCampaignID":"7015c000001SNN7AAO","campaign":"Resources_Contact_Us","contentForm":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3qHQ6eSp20iGQrFIfaBJnn","type":"Entry","createdAt":"2022-09-29T19:33:25.277Z","updatedAt":"2024-11-26T11:30:01.409Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":248,"revision":113,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"form"}},"locale":"en-US"},"fields":{"name":"Form_Ungated_Contact","title":"Wondering how GitHub can help your business?","subtitle":"Tell us more about your needs","eloquaFormName":"ContactUs_TemplateForm","formCTA":"Contact GitHub","formElements":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Euizanl72D7hjUPBu1cz4","type":"Entry","createdAt":"2023-04-04T12:27:44.815Z","updatedAt":"2024-11-26T11:37:30.225Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":372,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Last name","htmlName":"lastName","type":"text","placeholder":"Last name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6FMPEpNvfZnVg5o5pNdmAz","type":"Entry","createdAt":"2023-04-04T12:27:23.053Z","updatedAt":"2024-11-26T11:37:14.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":373,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"First name","htmlName":"firstName","type":"text","placeholder":"First name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6s0zB2lwQZz6ZhWkZQd5r0","type":"Entry","createdAt":"2022-09-29T18:54:51.900Z","updatedAt":"2024-11-26T11:36:43.185Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":234,"revision":112,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Work Email","htmlName":"emailAddress","type":"email","placeholder":"you@company.com","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3IumXBD9IQf1aCt2cTCoVh","type":"Entry","createdAt":"2023-06-23T19:25:51.253Z","updatedAt":"2024-11-26T11:36:56.805Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":212,"revision":105,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Phone","htmlName":"phone1","type":"tel","placeholder":"12 3456 7890","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5HOQnFx9120Wj4hlsjXaJn","type":"Entry","createdAt":"2022-03-12T20:19:03.843Z","updatedAt":"2024-11-26T11:37:58.388Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":374,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Company","htmlName":"company","type":"text","placeholder":"Acme, Inc","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1MS9X9RNVd6BmPN91fMsVg","type":"Entry","createdAt":"2022-09-29T19:31:39.832Z","updatedAt":"2024-11-26T11:37:05.764Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":209,"revision":104,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"What can we help you with?","htmlName":"contactComments","type":"textarea","placeholder":"Tell us how we can help. For support questions, head to github.com/contact ","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5zNCZ4hVsez1AWpp6Fga7h","type":"Entry","createdAt":"2022-03-12T20:23:32.191Z","updatedAt":"2024-11-20T14:58:44.487Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCustomerGUID","type":"hidden","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7a3HDjJcLkWmsPKHATLvna","type":"Entry","createdAt":"2022-03-12T20:24:00.556Z","updatedAt":"2024-11-20T14:58:44.527Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":18,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCookieWrite","type":"hidden","required":false,"defaultValue":"0"}}]}},"headerImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6zwk8uklFCQ2qeCWfCFiug","type":"Asset","createdAt":"2022-11-22T21:11:38.392Z","updatedAt":"2024-03-19T11:06:41.098Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":4,"locale":"en-US"},"fields":{"title":"Security - Dark 3","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png","details":{"size":94954,"image":{"width":1200,"height":630}},"fileName":"Security-DarkMode-3 1.png","contentType":"image/png"}}},"publicationDate":"2020-08-27T00:00-08:00","hidden":false,"marketoCampaign":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2ywGzPlFH9kTdiOBF75ggA","type":"Entry","createdAt":"2023-09-15T23:09:46.917Z","updatedAt":"2024-11-20T14:58:44.542Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":7,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"marketoCampaign"}},"locale":"en-US"},"fields":{"title":"CO-GHG-CONTACT-FY23-10Oct-01-WW-Resources-Contact-Request/406214","cDLProgramName":"406214","source":"Contact Request","formFields":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6z2cGa4cuvoWqGxS3Ejhv4","type":"Entry","createdAt":"2023-09-12T16:31:47.760Z","updatedAt":"2024-11-26T11:32:18.468Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":127,"revision":59,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"sFDCLastCampaignStatus","htmlName":"sFDCLastCampaignStatus","type":"hidden","required":false,"defaultValue":"Responded"}}],"active":true}}}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7rtXrg8vAsn6lhmzEq1WKp","type":"Entry","createdAt":"2022-03-12T02:30:20.156Z","updatedAt":"2024-10-03T13:03:41.807Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":6,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{"metaTitle":"Shipping fast with a secure supply chain on GitHub","metaDescription":"Following DevSecOps means approaching security as an ongoing part of software development—and staying up to date on the code your software depends on.","openGraphTitle":"Shipping fast with a secure supply chain on GitHub","openGraphDescription":"Following DevSecOps means approaching security as an ongoing part of software development—and staying up to date on the code your software depends on."}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1p3n1oSrA5YTtPey1jsrfK","type":"Entry","createdAt":"2024-01-04T13:08:04.865Z","updatedAt":"2024-02-21T16:27:42.501Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":11,"revision":4,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/security/the-enterprise-guide-to-ai-powered-devsecops","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5iQed2YYec1tsf2bWnc4Iz","type":"Entry","createdAt":"2024-01-04T13:08:05.010Z","updatedAt":"2024-10-03T12:41:25.981Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":35,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"Resource Page for /security/the-enterprise-guide-to-ai-powered-devsecops","path":"/security/the-enterprise-guide-to-ai-powered-devsecops","title":"The enterprise guide to AI-powered DevSecOps ","description":"DevSecOps is an approach to software development that integrates security throughout the software development life cycle (SDLC). In this guide, we’ll share core challenges when it comes to implementing DevSecOps, and how you can start addressing them with AI and automation.","body":"__What’s inside:__\n- Three core challenges to implementing DevSecOps and their main causes \n- Tactical examples that show how AI and automation can help to seamlessly secure your software supply chain \n- Three steps to augment your security intelligence with publicly available resources\n- A quick-reference diagram to show howAI and automation can help power DevSecOps \n\nBy baking security into every step of the SDLC, organizations take a proactive, rather than reactive, approach to security. Prioritizing security instead of making it an afterthought enables organizations to minimize security risks, improve compliance, save on increasingly expensive remediation costs by catching vulnerabilities earlier, and deliver value to their customers more quickly. \n","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3X85awR2KGnPvf4bjmrGqM","type":"Entry","createdAt":"2024-01-04T13:03:06.926Z","updatedAt":"2024-01-04T13:03:06.926Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"article"}},"locale":"en-US"},"fields":{"attachment":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"Le180kBdRnKrIfQzZ1UJr","type":"Asset","createdAt":"2024-01-04T13:02:58.856Z","updatedAt":"2024-05-23T21:10:42.879Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":15,"revision":3,"locale":"en-US"},"fields":{"title":"Github-Devops-ebook-TheEnterpriseGuideToAI-poweredDevSecOpsEbook","description":"Github-Devops-ebook-TheEnterpriseGuideToAI-poweredDevSecOpsEbook","file":{"url":"//assets.ctfassets.net/wfutmusr1t3h/Le180kBdRnKrIfQzZ1UJr/2c99e162e4d0425985897b7c75e5585d/github-ebook-the-enterprise-guide-to-ai-powered-devsecops.pdf","details":{"size":7670541},"fileName":"github-ebook-the-enterprise-guide-to-ai-powered-devsecops.pdf","contentType":"application/pdf"}}}}},"gated":true,"sfCampaignID":"7015c000001iiDdAAI","campaign":"2024q1-site-www-eBook-AI-powered DevSecOps","contentForm":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7sccq1wUFJ3K695PVHo559","type":"Entry","createdAt":"2023-09-07T09:51:54.846Z","updatedAt":"2024-11-26T11:48:26.099Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":62,"revision":29,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"form"}},"locale":"en-US"},"fields":{"name":"Form_Gated_PDF - \"Read the ebook\"","title":"Read the ebook","subtitle":"Tell us a bit about you.","eloquaFormName":"ContentReg_TemplateForm","formCTA":"Download PDF","formElements":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6FMPEpNvfZnVg5o5pNdmAz","type":"Entry","createdAt":"2023-04-04T12:27:23.053Z","updatedAt":"2024-11-26T11:37:14.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":373,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"First name","htmlName":"firstName","type":"text","placeholder":"First name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Euizanl72D7hjUPBu1cz4","type":"Entry","createdAt":"2023-04-04T12:27:44.815Z","updatedAt":"2024-11-26T11:37:30.225Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":372,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Last name","htmlName":"lastName","type":"text","placeholder":"Last name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6s0zB2lwQZz6ZhWkZQd5r0","type":"Entry","createdAt":"2022-09-29T18:54:51.900Z","updatedAt":"2024-11-26T11:36:43.185Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":234,"revision":112,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Work Email","htmlName":"emailAddress","type":"email","placeholder":"you@company.com","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5zNCZ4hVsez1AWpp6Fga7h","type":"Entry","createdAt":"2022-03-12T20:23:32.191Z","updatedAt":"2024-11-20T14:58:44.487Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCustomerGUID","type":"hidden","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7a3HDjJcLkWmsPKHATLvna","type":"Entry","createdAt":"2022-03-12T20:24:00.556Z","updatedAt":"2024-11-20T14:58:44.527Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":18,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCookieWrite","type":"hidden","required":false,"defaultValue":"0"}}]}},"headerImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1Lp1iXfQeQ3VE3IOE578rk","type":"Asset","createdAt":"2024-01-04T13:08:04.834Z","updatedAt":"2024-01-04T13:08:04.834Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":1,"locale":"en-US"},"fields":{"title":"security GitHub logo with ball and shield with a checkmark","description":"GitHub logo with ball and shield with a checkmark","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/1Lp1iXfQeQ3VE3IOE578rk/839fcb217cf6f7c8ae7e4a5e8fc395ab/290327022-96b47c64-07a8-48fa-8575-12098888dac8.png","details":{"size":24895,"image":{"width":1200,"height":630}},"fileName":"290327022-96b47c64-07a8-48fa-8575-12098888dac8.png","contentType":"image/png"}}},"headerCTA":"Download PDF","buttonCTA":"Download PDF","publicationDate":"2023-12-13T00:00","hidden":false,"rendersRichText":false,"marketoCampaign":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6ae9yy7FqzTWLRM7IOVroX","type":"Entry","createdAt":"2023-12-21T00:06:36.762Z","updatedAt":"2024-07-05T20:59:49.980Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":4,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"marketoCampaign"}},"locale":"en-US"},"fields":{"title":"CO-GHDO-CNTNT-FY24-12Dec-13-The-Enterprise-Guide-to-AI-Powered-DevSecOps/420790","cDLProgramName":"445013","source":"Paid Media: Content Syndication","active":true}}}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6PzeoUjOqwrWlzCYuEIg90","type":"Entry","createdAt":"2023-08-24T13:16:22.381Z","updatedAt":"2024-02-21T16:26:16.535Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/security/three-appsec-pitfalls-security","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3CEvDucXfOZFpxB8tt4ymX","type":"Entry","createdAt":"2021-11-19T17:36:36.437Z","updatedAt":"2024-10-03T12:39:32.957Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":54,"revision":24,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"Resource Page for /security/three-appsec-pitfalls-security","path":"/security/three-appsec-pitfalls-security","title":"Three AppSec pitfalls every security leader can avoid","description":"Secure software is critical for business success today. Here are some common application security pitfalls every software team can watch out for.","body":"\n## 1. Security as an afterthought\n\nDevelopers heavily outnumber security specialists in most organizations. Having developers create code and involving security at later stages in the development cycle is a losing battle because of the high speed and volume of releases. This approach doesn’t scale to cover all applications and keeps vulnerabilities from being discovered until it's too late—resulting in vulnerable code being pushed to production.\n\n\u003e Solution: Shift security left and scale security efforts to cover all applications, starting from the early stages of development.\n\n\n## 2. Silos and Dev-Sec friction\n\nTraditionally, communication between developers and security teams tends to be issue-driven or incident-driven. But bulk communication by only email, PDF reports, or GitHub issues leads to friction and is frustrating for everyone.\nFor developers, issues raised by security might not matter for day-to-day development or may include feedback for a project that should’ve already been finalized. Fixing these issues only adds stress around rescheduling sprint tasks and effort—making security a roadblock for innovation.\nFor security teams, it’s frustrating not to be involved during the architecture, design, and early phases of development. It can also be challenging to explain organizational and \u003ca href=\"https://resources.github.com/whitepapers/Application-security-guide/\"\u003eapplication security\u003c/a\u003e risks to developers who don’t have years of security expertise. In the end, poor communication leads to less collaboration and empathy overall.\n\n\u003e Solution: Make security part of development by integrating tools into your developer workflow. Promote discussions and asynchronous collaboration between both teams.\n\n\n## 3. Security as a checkbox exercise\n\nJust like the importance of security varies between organizations, actual security practices also vary within organizations themselves. The difference between formal security policies and how they’re put into practice can be confusing and make prioritizing security issues even more complicated.\n\nAlso keep in mind that application security is just a small part of an organization’s overall cyber security efforts, and tends to be isolated from development and CI/CD. This leads to bad habits like:\n\nValuing quantity over quality. Focusing on a high number of low-quality security scan results or vulnerabilities doesn’t solve larger problems and only adds more work for developers.\nMaking security a development problem. Plugging raw security scan results into issue trackers and just assuming that developers will fix them all desensitizes developers to security-related issues.\nNot measuring value. Just like any other initiative, the value and ROI of application security efforts should be continuously measured and evaluated. Otherwise, a lack of data can hold your organization back—and not show evidence that security improvements are being made.\n\n\u003e Solution: For an immediate fix, focus on pushing a limited number of real security issues, then prioritize and present them to developers instead of sharing a flood of false positives. On a larger scale, look for security tools that can “codify” new security issues and prevent them from ever being merged into a production branch. Remember: your security tools should actually improve your code—so keep measuring the value and impact of your application security program over time.\n\n\n\u003cbr\u003e\n\u003ctable\u003e\n \u003ctr\u003e\n \u003cth\u003e\n \u003ch4 class=\"h4-mktg\"\u003eQuestions about application security?\nWe’re here to help.\n\u003c/h4\u003e\n \u003c/th\u003e\n \u003cth\u003e\n \u003ch4 class=\"h4-mktg\"\u003e\u003ca href=\"mailt:sales@github.com\"\u003esales@github.com\u003c/a\u003e\n\u003ca href=\"https://github.com/features/security\"\u003ehttps://github.com/features/security\u003c/a\u003e\n\u003c/h4\u003e\n \u003c/th\u003e\n \u003c/tr\u003e\n","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6AeDgv34RHI6yn6HJYFvtF","type":"Entry","createdAt":"2021-11-19T17:36:35.659Z","updatedAt":"2021-11-19T17:36:35.659Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":1,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"article"}},"locale":"en-US"},"fields":{"attachment":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"OS8x8ZqTC8fAEFXimipU0","type":"Asset","createdAt":"2021-11-19T17:36:35.207Z","updatedAt":"2022-03-12T21:11:33.954Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":3,"locale":"en-US"},"fields":{"title":"/downloads/threeAppSecPitfalls.pdf","description":"threeAppSecPitfalls","file":{"url":"//assets.ctfassets.net/wfutmusr1t3h/OS8x8ZqTC8fAEFXimipU0/550f6998987dd446ca33ef39e0c9b7e3/_downloads_threeAppSecPitfalls.pdf","details":{"size":1974571},"fileName":"/downloads/threeAppSecPitfalls.pdf","contentType":"application/pdf"}}}}},"gated":true,"sfCampaignID":"7015c000001SNN7AAO","campaign":"Resources_Contact_Us","contentForm":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3qHQ6eSp20iGQrFIfaBJnn","type":"Entry","createdAt":"2022-09-29T19:33:25.277Z","updatedAt":"2024-11-26T11:30:01.409Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":248,"revision":113,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"form"}},"locale":"en-US"},"fields":{"name":"Form_Ungated_Contact","title":"Wondering how GitHub can help your business?","subtitle":"Tell us more about your needs","eloquaFormName":"ContactUs_TemplateForm","formCTA":"Contact GitHub","formElements":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Euizanl72D7hjUPBu1cz4","type":"Entry","createdAt":"2023-04-04T12:27:44.815Z","updatedAt":"2024-11-26T11:37:30.225Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":372,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Last name","htmlName":"lastName","type":"text","placeholder":"Last name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6FMPEpNvfZnVg5o5pNdmAz","type":"Entry","createdAt":"2023-04-04T12:27:23.053Z","updatedAt":"2024-11-26T11:37:14.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":373,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"First name","htmlName":"firstName","type":"text","placeholder":"First name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6s0zB2lwQZz6ZhWkZQd5r0","type":"Entry","createdAt":"2022-09-29T18:54:51.900Z","updatedAt":"2024-11-26T11:36:43.185Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":234,"revision":112,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Work Email","htmlName":"emailAddress","type":"email","placeholder":"you@company.com","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3IumXBD9IQf1aCt2cTCoVh","type":"Entry","createdAt":"2023-06-23T19:25:51.253Z","updatedAt":"2024-11-26T11:36:56.805Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":212,"revision":105,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Phone","htmlName":"phone1","type":"tel","placeholder":"12 3456 7890","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5HOQnFx9120Wj4hlsjXaJn","type":"Entry","createdAt":"2022-03-12T20:19:03.843Z","updatedAt":"2024-11-26T11:37:58.388Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":374,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Company","htmlName":"company","type":"text","placeholder":"Acme, Inc","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1MS9X9RNVd6BmPN91fMsVg","type":"Entry","createdAt":"2022-09-29T19:31:39.832Z","updatedAt":"2024-11-26T11:37:05.764Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":209,"revision":104,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"What can we help you with?","htmlName":"contactComments","type":"textarea","placeholder":"Tell us how we can help. For support questions, head to github.com/contact ","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5zNCZ4hVsez1AWpp6Fga7h","type":"Entry","createdAt":"2022-03-12T20:23:32.191Z","updatedAt":"2024-11-20T14:58:44.487Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCustomerGUID","type":"hidden","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7a3HDjJcLkWmsPKHATLvna","type":"Entry","createdAt":"2022-03-12T20:24:00.556Z","updatedAt":"2024-11-20T14:58:44.527Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":18,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCookieWrite","type":"hidden","required":false,"defaultValue":"0"}}]}},"headerCTA":"Download PDF","publicationDate":"2020-03-05T00:00:00.000Z","hidden":false,"marketoCampaign":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2ywGzPlFH9kTdiOBF75ggA","type":"Entry","createdAt":"2023-09-15T23:09:46.917Z","updatedAt":"2024-11-20T14:58:44.542Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":7,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"marketoCampaign"}},"locale":"en-US"},"fields":{"title":"CO-GHG-CONTACT-FY23-10Oct-01-WW-Resources-Contact-Request/406214","cDLProgramName":"406214","source":"Contact Request","formFields":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6z2cGa4cuvoWqGxS3Ejhv4","type":"Entry","createdAt":"2023-09-12T16:31:47.760Z","updatedAt":"2024-11-26T11:32:18.468Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":127,"revision":59,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"sFDCLastCampaignStatus","htmlName":"sFDCLastCampaignStatus","type":"hidden","required":false,"defaultValue":"Responded"}}],"active":true}}}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"seo--security-three-appsec-pitfalls-security","type":"Entry","createdAt":"2022-02-28T21:21:28.588Z","updatedAt":"2024-11-26T11:09:51.628Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":29,"revision":14,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{"metaTitle":"Three AppSec pitfalls every security leader can avoid","metaDescription":"Secure software is critical for business success today. Here are some common application security pitfalls every software team can watch out for.","openGraphTitle":"Three AppSec pitfalls every security leader can avoid","openGraphDescription":"Secure software is critical for business success today. Here are some common application security pitfalls every software team can watch out for.\""}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6enhUolPDWSmgVOQUddM1p","type":"Entry","createdAt":"2023-12-13T12:40:34.680Z","updatedAt":"2024-02-21T16:25:27.007Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":4,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/security/transforming-application-security-with-ai","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4sJ6jgVNvV94heUtQiqdRC","type":"Entry","createdAt":"2023-12-13T12:40:34.817Z","updatedAt":"2024-10-03T12:38:36.323Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":47,"revision":7,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"Resource Page for /security/transforming-application-security-with-ai","path":"/security/transforming-application-security-with-ai","title":"Transforming application security with AI","description":"From prevention to remediation, AI-assisted tooling changes everything.\n\nThe future of secure software development is here. Let’s dive in. ","body":"GitHub Advanced Security (GHAS) enables DevSecOps teams to prioritize innovation while maintaining robust security measures. At GitHub Universe, we explored how the AI-powered features within GHAS surface issues in the context of the development workflow, so vulnerabilities are fixed in minutes, not months. Now you can, too, during this exclusive on-demand webinar.\n\nWhat to expect:\n- Discover how AI-powered features in GHAS help developers ship secure software, faster.\n- Get ahead of the revolutionary changes that are reshaping the security landscape.\n- See real-world examples of AI-powered security tools in action.","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4IOBWJ3L0i89epPIAaUDwa","type":"Entry","createdAt":"2024-01-22T19:14:13.325Z","updatedAt":"2024-01-22T19:14:13.325Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"video"}},"locale":"en-US"},"fields":{"dateRecorded":"2024-01-17T00:00-05:00","speakers":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"16hSwqdgLWP4YYMBTh2Sbx","type":"Entry","createdAt":"2023-06-01T15:09:24.487Z","updatedAt":"2024-10-09T18:48:29.128Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":36,"revision":16,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Eric Tooley","avatar":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1mWndBhMbsf8M8WutUTy1O","type":"Asset","createdAt":"2023-06-01T15:09:09.619Z","updatedAt":"2023-06-01T15:09:09.619Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Eric Tooley","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/1mWndBhMbsf8M8WutUTy1O/109fba3d4c05bb557153238590733185/Screenshot_2023-06-01_at_17.08.00.png","details":{"size":372434,"image":{"width":504,"height":502}},"fileName":"Screenshot 2023-06-01 at 17.08.00.png","contentType":"image/png"}}},"title":"Senior Product Marketing Manager, Supply Chain","company":"GitHub"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3r8ykgaqBIunN59Fo3Ffzj","type":"Entry","createdAt":"2022-04-26T21:06:45.051Z","updatedAt":"2024-10-09T18:45:08.809Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":40,"revision":17,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Daniel Shanahan","avatar":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4si9CnC8ZW2KR7antUm4dm","type":"Asset","createdAt":"2022-04-26T21:06:40.142Z","updatedAt":"2022-04-26T21:06:40.142Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Daniel Shanahan","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/4si9CnC8ZW2KR7antUm4dm/809aa9bf855a9636d0797e9f7a7e06d1/Daniel-Shanahan.jpeg","details":{"size":42398,"image":{"width":512,"height":512}},"fileName":"Daniel-Shanahan.jpeg","contentType":"image/jpeg"}}},"title":"Principal Field Security Specialist","company":"GitHub"}}],"isWebcast":false}},"gated":true,"gatedContent":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3zIUAQ0bfqI5FcY7yUeLva","type":"Entry","createdAt":"2024-01-22T19:14:13.421Z","updatedAt":"2024-10-03T13:04:47.028Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":17,"revision":6,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"gatedContent"}},"locale":"en-US"},"fields":{"path":"/security/transforming-application-security-with-ai-gated","description":"From prevention to remediation, AI-assisted tooling changes everything.\n\nThe future of secure software development is here. Let’s dive in. ","body":"\u003cdiv class=\"embed-responsive embed-responsive-16by9\"\u003e\n \u003ciframe src=\"https://www.youtube.com/embed/jpOnKc9lFIc\" width=\"640\" height=\"375\" frameborder=\"0\" allowfullscreen\u003e\u003c/iframe\u003e\n\u003c/div\u003e\n\nGitHub Advanced Security (GHAS) enables DevSecOps teams to prioritize innovation while maintaining robust security measures. At GitHub Universe, we explored how the AI-powered features within GHAS surface issues in the context of the development workflow, so vulnerabilities are fixed in minutes, not months. Now you can, too, during this exclusive on-demand webinar.\n\nWhat to expect:\n- Discover how AI-powered features in GHAS help developers ship secure software, faster.\n- Get ahead of the revolutionary changes that are reshaping the security landscape.\n- See real-world examples of AI-powered security tools in action.","lang":"en"}},"sfCampaignID":"7015c000001ii84AAA","campaign":"CO-GHS-WBNR-FY24-01Jan-04-2024-AI-powered AppSec","contentForm":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2h0p98dZi8OlxOyXNA1nGU","type":"Entry","createdAt":"2022-08-25T19:01:44.094Z","updatedAt":"2024-11-26T11:30:09.749Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":128,"revision":56,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"form"}},"locale":"en-US"},"fields":{"name":"Gated video page generic form","title":"Sign up to watch","subtitle":"Tell us a bit about you","eloquaFormName":"ContentReg_TemplateForm","formCTA":"Watch the session","formElements":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6FMPEpNvfZnVg5o5pNdmAz","type":"Entry","createdAt":"2023-04-04T12:27:23.053Z","updatedAt":"2024-11-26T11:37:14.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":373,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"First name","htmlName":"firstName","type":"text","placeholder":"First name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Euizanl72D7hjUPBu1cz4","type":"Entry","createdAt":"2023-04-04T12:27:44.815Z","updatedAt":"2024-11-26T11:37:30.225Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":372,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Last name","htmlName":"lastName","type":"text","placeholder":"Last name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1oc1nNacqE77XQSuJXaNdl","type":"Entry","createdAt":"2022-03-12T20:17:06.911Z","updatedAt":"2024-11-26T11:37:42.078Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":281,"revision":138,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Work Email Address","htmlName":"emailAddress","type":"email","placeholder":"you@example.com","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5HOQnFx9120Wj4hlsjXaJn","type":"Entry","createdAt":"2022-03-12T20:19:03.843Z","updatedAt":"2024-11-26T11:37:58.388Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":374,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Company","htmlName":"company","type":"text","placeholder":"Acme, Inc","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"40sP3SIDeLJIKo7gAvmAdv","type":"Entry","createdAt":"2022-03-12T20:30:16.766Z","updatedAt":"2024-11-26T11:37:50.340Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":264,"revision":130,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Job Title","htmlName":"title","type":"text","placeholder":"Job Title","required":true}}]}},"headerImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6v54PXbBZX0xxf9VOsa0Mz","type":"Asset","createdAt":"2023-12-13T12:40:34.655Z","updatedAt":"2024-01-22T19:14:13.139Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":2,"locale":"en-US"},"fields":{"title":"A dark background with three large, gradient-filled circle and square, overlapping shapes positioned partially off-canvas, from the top-right of the image. Webinar: Transforming application security with AI.","description":"A dark background with three large, gradient-filled circle and square, overlapping shapes positioned partially off-canvas, from the top-right of the image. Webinar: Transforming application security with AI.","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/6v54PXbBZX0xxf9VOsa0Mz/e6410794410dc15ade67649b91e0ca56/2fa528dc-4acb-46a3-85f1-4d31b38a15f0-1200x630.png","details":{"size":409868,"image":{"width":1200,"height":630}},"fileName":"2fa528dc-4acb-46a3-85f1-4d31b38a15f0-1200x630.png","contentType":"image/png"}}},"headerCTA":"Watch webinar","buttonCTA":"Watch webinar","publicationDate":"2024-01-17T00:00","renderedDate":"On demand","hidden":false,"rendersRichText":false,"marketoCampaign":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5qEzw4s2MQckrvgSAi106F","type":"Entry","createdAt":"2024-01-08T14:54:15.566Z","updatedAt":"2024-06-20T16:24:10.108Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":13,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"marketoCampaign"}},"locale":"en-US"},"fields":{"title":"CO-GHS-WBNR-FY24-01Jan-04-2024-AI-powered AppSec/423220","cDLProgramName":"423220","source":"Owned Event: Webinar","formFields":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6z2cGa4cuvoWqGxS3Ejhv4","type":"Entry","createdAt":"2023-09-12T16:31:47.760Z","updatedAt":"2024-11-26T11:32:18.468Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":127,"revision":59,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"sFDCLastCampaignStatus","htmlName":"sFDCLastCampaignStatus","type":"hidden","required":false,"defaultValue":"Responded"}}],"active":true}}}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1W2ZAgfSK2jhEsyHPYV3ic","type":"Entry","createdAt":"2024-01-11T21:00:29.315Z","updatedAt":"2024-11-26T10:53:50.537Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":170,"revision":86,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"ai","label":"AI"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7hG9EVFCkxnBPJ5d9VhBxZ","type":"Entry","createdAt":"2023-08-24T13:17:28.174Z","updatedAt":"2024-02-21T16:26:40.707Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/security/virtual-summit","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1vB2H0e6AmkiqQPxb67yts","type":"Entry","createdAt":"2023-03-07T15:50:27.987Z","updatedAt":"2024-10-03T12:37:22.187Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":33,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"Resource Page for /security/virtual-summit","path":"/security/virtual-summit","title":"Application Security 3.0","description":"Discover how to proactively secure your software and defend against potential threats at our virtual summit, now available on demand! Gain valuable insights and practical strategies to enhance your code security and reduce risk with industry experts from 42Crunch, NowSecure, and Nucleus Security.","body":"![banner promoting the event including the companies presenting](//images.ctfassets.net/wfutmusr1t3h/7xuRD3AFLtWt2ztUC0z1ag/21080b1c7cff9c9ec69516b836f650b4/237482938-e50a7dd3-3951-4920-9dfe-a8c201d87a1e__1_.png)\n\n__Key takeaways:__\n\n- The latest in application security—and what’s next.\n- How to catch vulnerabilities early with GitHub Advanced Security.\n- How to implement automated security testing in mobile developments.\n- The importance of visibility into application vulnerabilities and weaknesses.\n\n\u003cbr /\u003e\u003cbr/\u003e\n__Application security 3.0 : What’s next for Application Security with Niroshan Rajadurai ( GitHub )__\n\u003cdiv class=\"embed-responsive embed-responsive-16by9\"\u003e\n \u003ciframe src=\"https://www.youtube.com/embed/DrIKurdWASQ\" width=\"640\" height=\"375\" frameborder=\"0\" allowfullscreen\u003e\u003c/iframe\u003e\n\u003c/div\u003e\n\n\u003cbr /\u003e\u003cbr/\u003e\n__API Security 101: Best practices for early vulnerability detection and prevention with Colin Domoney (42Crunch Head of Research), Dan Shanahan (GitHub Security Architect)__\n\u003cdiv class=\"embed-responsive embed-responsive-16by9\"\u003e\n \u003ciframe src=\"https://www.youtube.com/embed/gldbJrv5kd4\" width=\"640\" height=\"375\" frameborder=\"0\" allowfullscreen\u003e\u003c/iframe\u003e\n\u003c/div\u003e\n\n\u003cbr /\u003e\u003cbr/\u003e\n__Find and fix mobile security issues fast: a deep dive into NowSecure GitHub Actions with Andrew Hoog (NowSecure Founder)__\n\u003cdiv class=\"embed-responsive embed-responsive-16by9\"\u003e\n \u003ciframe src=\"https://www.youtube.com/embed/VpiGAiPvr-0\" width=\"640\" height=\"375\" frameborder=\"0\" allowfullscreen\u003e\u003c/iframe\u003e\n\u003c/div\u003e\n\n\u003cbr /\u003e\u003cbr/\u003e\n__Scale up your Enterprise AppSec with Scott Kuffer (Nucleus Security COO)__\n\u003cdiv class=\"embed-responsive embed-responsive-16by9\"\u003e\n \u003ciframe src=\"https://www.youtube.com/embed/B1rJN8v41tY\" width=\"640\" height=\"375\" frameborder=\"0\" allowfullscreen\u003e\u003c/iframe\u003e\n\u003c/div\u003e","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"v3g4tge9dwMUADA2uQeIT","type":"Entry","createdAt":"2023-05-11T12:29:53.194Z","updatedAt":"2023-05-11T12:29:53.194Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"video"}},"locale":"en-US"},"fields":{"dateRecorded":"2023-05-05T00:00-04:00","speakers":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5k1pOxsMkAuNMS7t9Jq6rV","type":"Entry","createdAt":"2021-11-19T17:44:41.699Z","updatedAt":"2024-10-09T18:56:31.932Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":38,"revision":18,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Niroshan Rajadurai","avatar":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5To28naAfB9JwV9viMTn2B","type":"Asset","createdAt":"2021-11-19T17:44:33.428Z","updatedAt":"2021-11-19T17:44:33.428Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"locale":"en-US"},"fields":{"title":"assets/img/avatars/niroshan.jpeg","description":"assets/img/avatars/niroshan.jpeg","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/5To28naAfB9JwV9viMTn2B/f9a6d56374df8dfd19e27efcbe6954c4/assets_img_avatars_niroshan.jpeg","details":{"size":25187,"image":{"width":460,"height":460}},"fileName":"assets/img/avatars/niroshan.jpeg","contentType":"image/jpeg"}}},"title":"Sr. Director GitHub Advanced Security","company":"GitHub"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2I9opTigXhBF7M5lAk9siR","type":"Entry","createdAt":"2023-03-07T15:29:09.527Z","updatedAt":"2024-10-09T18:45:53.225Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":39,"revision":17,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Colin Domoney","avatar":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5hhUwTX9jxWvbIbtLWMdYb","type":"Asset","createdAt":"2023-03-14T18:21:07.471Z","updatedAt":"2023-03-14T18:21:07.471Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Colin Domoney","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/5hhUwTX9jxWvbIbtLWMdYb/435269290835e44ae9e13d501c8554ab/unnamed.jpg","details":{"size":883557,"image":{"width":1200,"height":1498}},"fileName":"unnamed.jpg","contentType":"image/jpeg"}}},"title":"Chief Technology Evangelist","company":"42Crunch"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3r8ykgaqBIunN59Fo3Ffzj","type":"Entry","createdAt":"2022-04-26T21:06:45.051Z","updatedAt":"2024-10-09T18:45:08.809Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":40,"revision":17,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Daniel Shanahan","avatar":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4si9CnC8ZW2KR7antUm4dm","type":"Asset","createdAt":"2022-04-26T21:06:40.142Z","updatedAt":"2022-04-26T21:06:40.142Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Daniel Shanahan","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/4si9CnC8ZW2KR7antUm4dm/809aa9bf855a9636d0797e9f7a7e06d1/Daniel-Shanahan.jpeg","details":{"size":42398,"image":{"width":512,"height":512}},"fileName":"Daniel-Shanahan.jpeg","contentType":"image/jpeg"}}},"title":"Principal Field Security Specialist","company":"GitHub"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"0t18dGUQqjzrz6QvL1xaf","type":"Entry","createdAt":"2023-02-22T21:23:55.956Z","updatedAt":"2024-10-09T18:56:08.774Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":39,"revision":17,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Andrew Hoog","avatar":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7uBZhh9nmwfB4KE11Ta9jL","type":"Asset","createdAt":"2023-02-28T17:18:04.505Z","updatedAt":"2023-02-28T17:18:04.505Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Andrew Hoog Nowsecure","description":"Andrew Hoog headshot","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/7uBZhh9nmwfB4KE11Ta9jL/ba1405daf4c5a0fe3eb14eeeb63e7037/andrew-hoog-319.png","details":{"size":33486,"image":{"width":319,"height":319}},"fileName":"andrew-hoog-319.png","contentType":"image/png"}}},"title":"Founder","company":"NowSecure"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1MxP45creLjNOdBGn15xpF","type":"Entry","createdAt":"2023-03-07T15:30:09.203Z","updatedAt":"2024-10-09T18:56:13.868Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":36,"revision":16,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Scott Kuffer","avatar":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1FJei8sOXqMP9nTH2SgRNw","type":"Asset","createdAt":"2023-03-14T18:22:03.554Z","updatedAt":"2023-03-14T18:22:03.554Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Scott Kuffer","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/1FJei8sOXqMP9nTH2SgRNw/2e7bab15e0f68f1586f4c6c0bc464744/unnamed__9_.png","details":{"size":359746,"image":{"width":1251,"height":1251}},"fileName":"unnamed (9).png","contentType":"image/png"}}},"title":"COO","company":"Nucleus Security"}}],"isWebcast":true}},"gated":true,"sfCampaignID":"7015c000000rIFoAAM","campaign":"2023q3-webinar-amer-Security virtual summit","contentForm":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3qHQ6eSp20iGQrFIfaBJnn","type":"Entry","createdAt":"2022-09-29T19:33:25.277Z","updatedAt":"2024-11-26T11:30:01.409Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":248,"revision":113,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"form"}},"locale":"en-US"},"fields":{"name":"Form_Ungated_Contact","title":"Wondering how GitHub can help your business?","subtitle":"Tell us more about your needs","eloquaFormName":"ContactUs_TemplateForm","formCTA":"Contact GitHub","formElements":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Euizanl72D7hjUPBu1cz4","type":"Entry","createdAt":"2023-04-04T12:27:44.815Z","updatedAt":"2024-11-26T11:37:30.225Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":372,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Last name","htmlName":"lastName","type":"text","placeholder":"Last name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6FMPEpNvfZnVg5o5pNdmAz","type":"Entry","createdAt":"2023-04-04T12:27:23.053Z","updatedAt":"2024-11-26T11:37:14.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":373,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"First name","htmlName":"firstName","type":"text","placeholder":"First name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6s0zB2lwQZz6ZhWkZQd5r0","type":"Entry","createdAt":"2022-09-29T18:54:51.900Z","updatedAt":"2024-11-26T11:36:43.185Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":234,"revision":112,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Work Email","htmlName":"emailAddress","type":"email","placeholder":"you@company.com","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3IumXBD9IQf1aCt2cTCoVh","type":"Entry","createdAt":"2023-06-23T19:25:51.253Z","updatedAt":"2024-11-26T11:36:56.805Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":212,"revision":105,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Phone","htmlName":"phone1","type":"tel","placeholder":"12 3456 7890","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5HOQnFx9120Wj4hlsjXaJn","type":"Entry","createdAt":"2022-03-12T20:19:03.843Z","updatedAt":"2024-11-26T11:37:58.388Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":374,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Company","htmlName":"company","type":"text","placeholder":"Acme, Inc","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1MS9X9RNVd6BmPN91fMsVg","type":"Entry","createdAt":"2022-09-29T19:31:39.832Z","updatedAt":"2024-11-26T11:37:05.764Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":209,"revision":104,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"What can we help you with?","htmlName":"contactComments","type":"textarea","placeholder":"Tell us how we can help. For support questions, head to github.com/contact ","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5zNCZ4hVsez1AWpp6Fga7h","type":"Entry","createdAt":"2022-03-12T20:23:32.191Z","updatedAt":"2024-11-20T14:58:44.487Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCustomerGUID","type":"hidden","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7a3HDjJcLkWmsPKHATLvna","type":"Entry","createdAt":"2022-03-12T20:24:00.556Z","updatedAt":"2024-11-20T14:58:44.527Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":18,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCookieWrite","type":"hidden","required":false,"defaultValue":"0"}}]}},"headerImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7xuRD3AFLtWt2ztUC0z1ag","type":"Asset","createdAt":"2023-03-29T20:00:31.895Z","updatedAt":"2023-05-12T19:36:56.525Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":" /security/virtual-summit","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/7xuRD3AFLtWt2ztUC0z1ag/21080b1c7cff9c9ec69516b836f650b4/237482938-e50a7dd3-3951-4920-9dfe-a8c201d87a1e__1_.png","details":{"size":333356,"image":{"width":1000,"height":523}},"fileName":"237482938-e50a7dd3-3951-4920-9dfe-a8c201d87a1e (1).png","contentType":"image/png"}}},"headerCTA":"Register","buttonCTA":"Register","publicationDate":"2023-05-04T00:00-05:00","renderedDate":"On Demand","hidden":false,"rendersRichText":false,"marketoCampaign":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2ywGzPlFH9kTdiOBF75ggA","type":"Entry","createdAt":"2023-09-15T23:09:46.917Z","updatedAt":"2024-11-20T14:58:44.542Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":7,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"marketoCampaign"}},"locale":"en-US"},"fields":{"title":"CO-GHG-CONTACT-FY23-10Oct-01-WW-Resources-Contact-Request/406214","cDLProgramName":"406214","source":"Contact Request","formFields":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6z2cGa4cuvoWqGxS3Ejhv4","type":"Entry","createdAt":"2023-09-12T16:31:47.760Z","updatedAt":"2024-11-26T11:32:18.468Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":127,"revision":59,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"sFDCLastCampaignStatus","htmlName":"sFDCLastCampaignStatus","type":"hidden","required":false,"defaultValue":"Responded"}}],"active":true}}}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3kB2nRgqTdEa9PObpsrVaz","type":"Entry","createdAt":"2023-03-07T15:42:52.243Z","updatedAt":"2024-10-03T13:03:37.132Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":25,"revision":9,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{"metaTitle":"Application security 3.0 : What’s next for Application Security","metaDescription":"How can you proactively secure your software and defend against potential threats? Join us for a virtual summit on April 4th, where you’ll gain valuable insights and practical strategies to enhance your code security and reduce risk. ","metaImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7xuRD3AFLtWt2ztUC0z1ag","type":"Asset","createdAt":"2023-03-29T20:00:31.895Z","updatedAt":"2023-05-12T19:36:56.525Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":" /security/virtual-summit","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/7xuRD3AFLtWt2ztUC0z1ag/21080b1c7cff9c9ec69516b836f650b4/237482938-e50a7dd3-3951-4920-9dfe-a8c201d87a1e__1_.png","details":{"size":333356,"image":{"width":1000,"height":523}},"fileName":"237482938-e50a7dd3-3951-4920-9dfe-a8c201d87a1e (1).png","contentType":"image/png"}}},"openGraphTitle":"Application security 3.0 : What’s next for Application Security","openGraphDescription":"How can you proactively secure your software and defend against potential threats? Join us for a virtual summit on April 4th, where you’ll gain valuable insights and practical strategies to enhance your code security and reduce risk. "}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5R9zfL5sHOvIqOX4WnG1mJ","type":"Entry","createdAt":"2024-01-11T21:00:30.758Z","updatedAt":"2024-11-26T10:53:17.315Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":85,"revision":44,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"github-advanced-security","label":"GitHub Advanced Security"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1E4qQsbRmK7LnGKo03Oo6n","type":"Entry","createdAt":"2024-03-22T14:21:04.642Z","updatedAt":"2024-03-22T14:21:04.642Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/security/what-is-application-security","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5GCmonDZtabpfQR7aRpOSQ","type":"Entry","createdAt":"2024-03-22T14:21:04.689Z","updatedAt":"2024-03-22T14:21:04.689Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"containerLandingPage"}},"locale":"en-US"},"fields":{"title":"/security/what-is-application-security","sections":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"l3oRQVGYO0xUB0yWqHnNV","type":"Entry","createdAt":"2024-03-22T14:21:04.725Z","updatedAt":"2024-03-22T14:21:04.725Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionHero"}},"locale":"en-US"},"fields":{"title":"/security/what-is-application-security Hero","hero":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7G5213wmfHc5Nst7sE0Z1B","type":"Entry","createdAt":"2024-03-22T14:21:04.756Z","updatedAt":"2024-10-09T16:20:23.988Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":8,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentHero"}},"locale":"en-US"},"fields":{"title":"/security/what-is-application-security Hero","heading":"What is application security and how does it work?","text":"Application security, sometimes shortened to AppSec, refers to the security measures used to protect software from unauthorized access, use, disclosure, disruption, modification, or destruction. The practice of AppSec implements safeguards and controls to protect software from cyberthreats, and to ensure the confidentiality, integrity, and availability of the application and its data.\n\n","align":"Left"}},"backgroundImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6zwk8uklFCQ2qeCWfCFiug","type":"Asset","createdAt":"2022-11-22T21:11:38.392Z","updatedAt":"2024-03-19T11:06:41.098Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":4,"locale":"en-US"},"fields":{"title":"Security - Dark 3","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png","details":{"size":94954,"image":{"width":1200,"height":630}},"fileName":"Security-DarkMode-3 1.png","contentType":"image/png"}}},"theme":"dark"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6dDCqpOfeNgnZv9pqFICgO","type":"Entry","createdAt":"2024-03-22T14:21:04.817Z","updatedAt":"2024-03-22T14:21:04.817Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentAnchorNav"}},"locale":"en-US"},"fields":{"title":"/security/what-is-application-security Nav","links":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2LTzQ1IJcboN2Spp0NkFOi","type":"Entry","createdAt":"2024-03-13T16:33:37.066Z","updatedAt":"2024-10-09T18:20:08.644Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":20,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"anchorLink"}},"locale":"en-US"},"fields":{"title":"Importance","text":"Importance","href":"importance"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"EHfQIMCx2RCkoHIFfGmDh","type":"Entry","createdAt":"2024-03-13T16:16:37.008Z","updatedAt":"2024-10-09T18:20:46.714Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":22,"revision":11,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"anchorLink"}},"locale":"en-US"},"fields":{"title":"Types","text":"Types","href":"types"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3ASCDB2n31FrCghDgIcpU3","type":"Entry","createdAt":"2024-03-14T14:48:21.604Z","updatedAt":"2024-10-09T18:21:18.429Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":24,"revision":11,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"anchorLink"}},"locale":"en-US"},"fields":{"title":"How does it work","text":"How does it work","href":"how-does-it-work"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"SdjmyHu23pB1H10VdxkJH","type":"Entry","createdAt":"2023-10-18T13:15:01.200Z","updatedAt":"2024-10-09T18:22:41.398Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":29,"revision":13,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"anchorLink"}},"locale":"en-US"},"fields":{"title":"Best practices ","text":"Best practices","href":"best-practices"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6JBpSa6kNeCj0NEnMK6QIU","type":"Entry","createdAt":"2023-03-31T02:17:35.715Z","updatedAt":"2024-10-09T18:22:09.372Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":30,"revision":12,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"anchorLink"}},"locale":"en-US"},"fields":{"title":"FAQs","text":"FAQs","href":"faqs"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3rVxbqmQeOSExEn8HSqEsV","type":"Entry","createdAt":"2024-03-22T14:21:04.848Z","updatedAt":"2024-03-22T14:21:04.848Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionProse"}},"locale":"en-US"},"fields":{"internalTitle":"/security/what-is-application-security Prose - importance","sectionId":"importance","prose":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6jYBA8O0Nejji5zLzGALIK","type":"Entry","createdAt":"2024-03-22T14:21:04.916Z","updatedAt":"2024-10-09T18:32:43.878Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":22,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentProse"}},"locale":"en-US"},"fields":{"internalTitle":"/security/what-is-application-security Prose - importance","text":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Why is application security important?","nodeType":"text"}],"nodeType":"heading-2"},{"data":{},"content":[{"data":{},"marks":[],"value":"With the rise of cloud-based apps and services, applications are often targeted by attackers seeking to exploit weaknesses and gain access to sensitive data. App vulnerabilities can range from simple coding errors to more complex issues like unsecure settings or misconfigured environments.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"The serious consequences from a security breach—like the loss of sensitive data, financial risk, or damage to a company's reputation—are a well-documented, almost daily occurrence. They also highlight the importance of building secure software in every phase of app design, development, and deployment. These business consequences can extend to developers as well. In many companies, development and security teams are siloed or there may be limited AppSec expertise or resources. This is especially problematic when companies deploy hundreds of apps at a time and it creates an environment where developers—along with the pressure to write code and ship software faster—often bear the burden of security and compliance for their orgs, too.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"Learn more about the importance of building secure software in the ebook ","nodeType":"text"},{"data":{"uri":"https://assets.ctfassets.net/wfutmusr1t3h/51NwLo4csiUKuRtccNeQPB/59a93f9e5aeee3c7297127b626d2f660/The_GitHub_guide_to_empowering_developers.pdf"},"content":[{"data":{},"marks":[],"value":"Empowering developers to build secure software faster","nodeType":"text"}],"nodeType":"hyperlink"},{"data":{},"marks":[],"value":".","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"The importance of proactive application security","nodeType":"text"}],"nodeType":"heading-2"},{"data":{},"content":[{"data":{},"marks":[],"value":"A proactive security approach focuses on ","nodeType":"text"},{"data":{},"marks":[{"type":"italic"}],"value":"prevention","nodeType":"text"},{"data":{},"marks":[],"value":" and builds in security right from the start—in the design of the app. This approach integrates security into the developer workflow using methods like code, secret, and dependency scanning.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"A proactive approach to app security is important to:","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Protect against malicious hacks ","nodeType":"text"},{"data":{},"marks":[],"value":"by identifying weaknesses to prevent data breaches before they happen.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Keep compliant with data protection laws ","nodeType":"text"},{"data":{},"marks":[],"value":"to avoid penalties of noncompliance.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Proactively safeguard sensitive data ","nodeType":"text"},{"data":{},"marks":[],"value":"by locating errors that might expose confidential information.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Free up devs’ time to create ","nodeType":"text"},{"data":{"uri":"https://resources.github.com/contact/security/"},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"more secure, resilient apps","nodeType":"text"}],"nodeType":"hyperlink"},{"data":{},"marks":[],"value":" and spend less time on remediation and patching.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"}],"nodeType":"ordered-list"},{"data":{},"content":[{"data":{},"marks":[],"value":"Learn why a proactive security strategy is the best way to secure your code in the ebook ","nodeType":"text"},{"data":{"uri":"https://assets.ctfassets.net/wfutmusr1t3h/A7lQtI35DV7fTVkziDY5G/4163fa8d76fac82f9f12ead6d113698c/Github_OnePager_Proactive_vs_Reactive_Security_28102022.pdf"},"content":[{"data":{},"marks":[],"value":"Proactive vs Reactive Security","nodeType":"text"}],"nodeType":"hyperlink"},{"data":{},"marks":[],"value":".","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"}}}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5JKWmvf2CiTcj9i4amKJvU","type":"Entry","createdAt":"2024-03-22T14:21:05.019Z","updatedAt":"2024-03-22T14:21:05.019Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionProse"}},"locale":"en-US"},"fields":{"internalTitle":"/security/what-is-application-security Prose - types","sectionId":"types","prose":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5eQMFdZbWTcvAMzPnbGQPh","type":"Entry","createdAt":"2024-03-22T14:21:05.414Z","updatedAt":"2024-10-09T18:32:46.352Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":24,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentProse"}},"locale":"en-US"},"fields":{"internalTitle":"/security/what-is-application-security Prose - types","text":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"What are some types of application security?","nodeType":"text"}],"nodeType":"heading-2"},{"data":{},"content":[{"data":{},"marks":[],"value":"Application security measures fall into several overlapping categories:, including:","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Network security","nodeType":"text"},{"data":{},"marks":[],"value":" helps protect the integrity and confidentiality of data transmitted over a network. Examples include firewalls, SSL/TLS encryption, and virtual private networks (VPNs), as well as microsegmentation, real-time detection, and end-to-end encryption.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Data security","nodeType":"text"},{"data":{},"marks":[],"value":" protects data from unauthorized access, modification, or destruction. Examples include data encryption, access control, and data backup and recovery methods.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Access control","nodeType":"text"},{"data":{},"marks":[],"value":" manages user access to resources within an app. Examples include authentication, authorization, and permissions management.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Application runtime security","nodeType":"text"},{"data":{},"marks":[],"value":" are protections that work while the app is running. Examples include input validation, authentication and authorization controls, and secure coding practices.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Cryptography","nodeType":"text"},{"data":{},"marks":[],"value":" uses algorithms to encode and decode data, making it difficult for unauthorized parties to access or modify it. Examples include symmetric key encryption, public key encryption, and digital signatures.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"}],"nodeType":"unordered-list"},{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Five common components of application security","nodeType":"text"}],"nodeType":"heading-2"},{"data":{},"content":[{"data":{},"marks":[],"value":"Generally speaking, there are five broad components of app security:","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Vulnerability assessment","nodeType":"text"},{"data":{},"marks":[],"value":" is the process of identifying, analyzing, and prioritizing fixes in an organization's systems. It uses various tools and techniques to scan networks, systems, and apps for weaknesses and assess the risks.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Security measures","nodeType":"text"},{"data":{},"marks":[],"value":" are all the controls and processes that protect against threats and vulnerabilities. These can include technical measures like firewalls, antivirus software, and encryption, as well as access controls and security policies.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Security policies and procedures","nodeType":"text"},{"data":{},"marks":[],"value":" are the rules and guidelines that an organization puts in place to ensure the security of its systems and data. These can include policies on password management, access controls, data protection, and incident response.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Security training and company awareness","nodeType":"text"},{"data":{},"marks":[],"value":" educates employees in security measures and creates a culture of security with best practices like Zero Trust and secure coding.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Incident response and recovery","nodeType":"text"},{"data":{},"marks":[],"value":" are the plans and procedures for detecting and responding to incidents, as well as the processes for recovering from and mitigating the effects of an incident.\n\n","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"}],"nodeType":"unordered-list"},{"data":{},"content":[{"data":{},"marks":[],"value":"","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"}}}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2QIdi8nyw1kbofWeMbX5zf","type":"Entry","createdAt":"2024-03-22T14:19:37.932Z","updatedAt":"2024-03-22T14:19:37.932Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionRivers"}},"locale":"en-US"},"fields":{"title":"SEO River - interrupt - Security at every step","rivers":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6cg4LOHwTiQv5VQk5zmJVN","type":"Entry","createdAt":"2024-03-22T14:19:37.992Z","updatedAt":"2024-10-09T15:25:58.717Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":8,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentRiver"}},"locale":"en-US"},"fields":{"title":"SEO River - interrupt - Security at every step","heading":"Security at every step","text":"Find and fix vulnerabilities swiftly with GitHub Advanced Security, ensuring fast remediation rates and seamless integration into your workflow.","media":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6zwk8uklFCQ2qeCWfCFiug","type":"Asset","createdAt":"2022-11-22T21:11:38.392Z","updatedAt":"2024-03-19T11:06:41.098Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":4,"locale":"en-US"},"fields":{"title":"Security - Dark 3","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png","details":{"size":94954,"image":{"width":1200,"height":630}},"fileName":"Security-DarkMode-3 1.png","contentType":"image/png"}}},"align":"end","imageTextRatio":"50:50"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3w3mAhEGbcRtOcUnTRJ3Er","type":"Entry","createdAt":"2024-03-22T14:21:05.433Z","updatedAt":"2024-03-22T14:21:05.433Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionProse"}},"locale":"en-US"},"fields":{"internalTitle":"/security/what-is-application-security Prose - how-does-it-work","sectionId":"how-does-it-work","prose":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5zXEAmGe5Xar3NUBcAc5Ki","type":"Entry","createdAt":"2024-03-22T14:21:05.449Z","updatedAt":"2024-10-09T18:32:48.687Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":25,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentProse"}},"locale":"en-US"},"fields":{"internalTitle":"/security/what-is-application-security Prose - how-does-it-work","text":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"How does application security work?","nodeType":"text"}],"nodeType":"heading-2"},{"data":{},"content":[{"data":{},"marks":[],"value":"Here are some more specific examples of how application security is put into practice:","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Vulnerability assessments","nodeType":"text"},{"data":{},"marks":[],"value":", including code and architecture review. Some common vulnerabilities are cross-site scripting (XSS), SQL injection attacks, unvalidated input, and security misconfigurations.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Security testing ","nodeType":"text"},{"data":{},"marks":[],"value":"with a variety of testing methods, like static code analysis, ","nodeType":"text"},{"data":{"uri":"https://resources.github.com/security/what-is-dast/"},"content":[{"data":{},"marks":[],"value":"dynamic application security testing (DAST)","nodeType":"text"}],"nodeType":"hyperlink"},{"data":{},"marks":[],"value":", penetration testing, and fuzz testing.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Monitoring","nodeType":"text"},{"data":{},"marks":[],"value":", including monitoring network traffic, logs, and other indicators of potential threats.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"}],"nodeType":"unordered-list"},{"data":{},"content":[{"data":{},"marks":[],"value":"\n","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"}}}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2Q4ztgqTNCPilsIPxpg29D","type":"Entry","createdAt":"2024-03-22T14:21:05.525Z","updatedAt":"2024-03-22T14:21:05.525Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionProse"}},"locale":"en-US"},"fields":{"internalTitle":"/security/what-is-application-security Prose - best-practices","sectionId":"best-practices","prose":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6RCt9SRldl0up0CvfMqZws","type":"Entry","createdAt":"2024-03-22T14:21:05.545Z","updatedAt":"2024-10-09T18:34:37.512Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":29,"revision":11,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentProse"}},"locale":"en-US"},"fields":{"internalTitle":"/security/what-is-application-security Prose - best-practices","text":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Eight best practices for application security","nodeType":"text"}],"nodeType":"heading-2"},{"data":{},"content":[{"data":{},"marks":[],"value":"While there are numerous platforms and services devoted solely to app security, app developers and companies of all sizes can benefit from adopting these eight security best practices:","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Implement input validation: ","nodeType":"text"},{"data":{},"marks":[],"value":"Ensure that data entered into the system is valid and meets the required criteria. This can help to prevent attacks like SQL injection.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Enable access control: ","nodeType":"text"},{"data":{},"marks":[],"value":"Enhance password security using robust password policies, like password managers, generators, and even passwordless options.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Adopt strong authentication: ","nodeType":"text"},{"data":{},"marks":[],"value":"This can include using usernames and passwords, as well as VPN tokens, biometric authentication like thumbprints, and other methods to confirm a user's identity.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Always encrypt data: ","nodeType":"text"},{"data":{},"marks":[],"value":"Encrypting data, in transit and at rest, is one of the best ways to prevent unauthorized access to data transmission. Strong encryption can make leaked data useless to bad actors.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Implement patch management","nodeType":"text"},{"data":{},"marks":[],"value":": Regularly update and patch the system to fix vulnerabilities and prevent exploits.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Take a risk assessment: ","nodeType":"text"},{"data":{},"marks":[],"value":"Learn how to use real-time analytics tools and monitoring to control user access, discover shadow IT, and limit app sprawl.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Conduct security testing: ","nodeType":"text"},{"data":{},"marks":[],"value":"Regularly test the system using vulnerability assessments, penetration testing, and other types of testing to make sure your apps and data are secure.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Enforce protections on source code","nodeType":"text"},{"data":{},"marks":[],"value":": Follow best practices for writing secure code, including using secure programming language and frameworks.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"}],"nodeType":"unordered-list"},{"data":{},"content":[{"data":{},"marks":[],"value":"By following these best practices, app developers can significantly improve the security of their apps and data—and help protect from threats like hacking, malware, and other cyberattacks.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Next steps to keep your code and secrets secure","nodeType":"text"}],"nodeType":"heading-2"},{"data":{},"content":[{"data":{},"marks":[],"value":"GitHub has several tools and features to help you test and secure your apps, including:","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"","nodeType":"text"},{"data":{"uri":"https://www.youtube.com/watch?v=Grel10blARo"},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Code scanning","nodeType":"text"}],"nodeType":"hyperlink"},{"data":{},"marks":[],"value":" enables developers to find and fix security issues in the code before the app reaches production. It’s also referred to as static application security testing (SAST).","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"","nodeType":"text"},{"data":{"uri":"https://www.youtube.com/watch?v=bMqz_UkYg8w"},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Secret scanning","nodeType":"text"}],"nodeType":"hyperlink"},{"data":{},"marks":[],"value":" prevents unauthorized access and breaches by monitoring repositories for known secret formats, and notifying developers as soon as secrets are found.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"","nodeType":"text"},{"data":{"uri":"https://docs.github.com/en/code-security/dependabot/dependabot-security-updates/about-dependabot-security-updates"},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Dependabot","nodeType":"text"}],"nodeType":"hyperlink"},{"data":{},"marks":[],"value":" makes it easier for you to fix vulnerable dependencies in your repository. This feature raises alerts for vulnerabilities in the dependency graph of your repository and automatically tries to fix it.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Supply chain security ","nodeType":"text"},{"data":{},"marks":[],"value":"catches vulnerable dependencies with software composition analysis (SCA)—and flags them before they are introduced into the code base.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Security overview ","nodeType":"text"},{"data":{},"marks":[],"value":"simplifies security management and policies with a centralized view of all the security risks across an organization and in individual repositories.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"}],"nodeType":"unordered-list"},{"data":{},"content":[{"data":{},"marks":[],"value":"For an all-up solution to keep your code and secrets safe, check out ","nodeType":"text"},{"data":{"uri":"https://github.com/enterprise/advanced-security"},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"GitHub Advanced Security","nodeType":"text"}],"nodeType":"hyperlink"},{"data":{},"marks":[],"value":"—which helps you identify and fix vulnerabilities in your code, including static code analysis, dependency scanning, and secret scanning.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"}}}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3LBu9RTCHU0XfUnh6aWpIP","type":"Entry","createdAt":"2024-03-22T14:21:05.624Z","updatedAt":"2024-10-09T18:17:02.669Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":21,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionFAQ"}},"locale":"en-US"},"fields":{"title":"/security/what-is-application-security FAQ","sectionId":"faqs","heading":"Frequently asked questions","faqBlocks":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3ilRh0NXAisa0NE23DEk9P","type":"Entry","createdAt":"2024-03-22T14:21:05.639Z","updatedAt":"2024-03-22T14:21:05.639Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentFAQBlock"}},"locale":"en-US"},"fields":{"title":"/security/what-is-application-security FAQ","questions":[]}}]}}]}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5ZNjm2f8Pk5d6oZgsGHSU9","type":"Entry","createdAt":"2023-03-28T14:51:12.158Z","updatedAt":"2024-03-22T14:21:05.722Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{"metaTitle":"What is application security and how does it work? - GitHub Resources","metaDescription":"Learn more about the importance of app security and how to safeguard your applications.","openGraphTitle":"What Is Application Security and How Does It Work? | GitHub Resources","openGraphDescription":"Get an overview of what application security is and how it works, as well as best practices. Learn more about the importance of application security and how to safeguard your apps."}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7dVBWz8FiPvvTbaiU0bvgQ","type":"Entry","createdAt":"2024-03-22T14:19:37.239Z","updatedAt":"2024-03-22T14:19:56.898Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/security/what-is-dast","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6Q9Y4i1pSuOQaRefO2E52F","type":"Entry","createdAt":"2024-03-22T14:19:37.489Z","updatedAt":"2024-03-22T14:19:37.489Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":13,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"containerLandingPage"}},"locale":"en-US"},"fields":{"title":"/security/what-is-dast","sections":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6PyZpniVB7cv9rXxGUfwsZ","type":"Entry","createdAt":"2024-03-22T14:19:37.597Z","updatedAt":"2024-03-22T14:19:37.597Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionHero"}},"locale":"en-US"},"fields":{"title":"/security/what-is-dast Hero","hero":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2SMIU2xfhmYVLGuJ231MIp","type":"Entry","createdAt":"2024-03-22T14:19:37.691Z","updatedAt":"2024-10-09T16:20:28.897Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":20,"revision":8,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentHero"}},"locale":"en-US"},"fields":{"title":"/security/what-is-dast Hero","heading":"Dynamic application security testing (DAST)","align":"Left"}},"backgroundImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3brGEQk2zC0BIWfpZFFQI3","type":"Asset","createdAt":"2023-03-17T14:57:28.918Z","updatedAt":"2024-03-19T11:06:10.013Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":5,"locale":"en-US"},"fields":{"title":"Security - Dark 1","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/3brGEQk2zC0BIWfpZFFQI3/368db18eb3764b08fe0e24005f513881/Security-DarkMode-1_1.png","details":{"size":93322,"image":{"width":1200,"height":630}},"fileName":"Security-DarkMode-1 1.png","contentType":"image/png"}}},"theme":"dark"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3cy3KaDTGrmY9TodkEQLRD","type":"Entry","createdAt":"2024-03-22T14:19:37.708Z","updatedAt":"2024-03-22T14:19:37.708Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentAnchorNav"}},"locale":"en-US"},"fields":{"title":"/security/what-is-dast Nav","links":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2LTzQ1IJcboN2Spp0NkFOi","type":"Entry","createdAt":"2024-03-13T16:33:37.066Z","updatedAt":"2024-10-09T18:20:08.644Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":20,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"anchorLink"}},"locale":"en-US"},"fields":{"title":"Importance","text":"Importance","href":"importance"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3ASCDB2n31FrCghDgIcpU3","type":"Entry","createdAt":"2024-03-14T14:48:21.604Z","updatedAt":"2024-10-09T18:21:18.429Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":24,"revision":11,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"anchorLink"}},"locale":"en-US"},"fields":{"title":"How does it work","text":"How does it work","href":"how-does-it-work"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"EHfQIMCx2RCkoHIFfGmDh","type":"Entry","createdAt":"2024-03-13T16:16:37.008Z","updatedAt":"2024-10-09T18:20:46.714Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":22,"revision":11,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"anchorLink"}},"locale":"en-US"},"fields":{"title":"Types","text":"Types","href":"types"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"13VjH3zCjCrSqNl1aOYuYg","type":"Entry","createdAt":"2024-03-13T16:27:09.199Z","updatedAt":"2024-10-09T18:20:03.374Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":22,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"anchorLink"}},"locale":"en-US"},"fields":{"title":"Benefits","text":"Benefits","href":"benefits"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6JBpSa6kNeCj0NEnMK6QIU","type":"Entry","createdAt":"2023-03-31T02:17:35.715Z","updatedAt":"2024-10-09T18:22:09.372Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":30,"revision":12,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"anchorLink"}},"locale":"en-US"},"fields":{"title":"FAQs","text":"FAQs","href":"faqs"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"36dvClbwiQOXOI9nsXHw0C","type":"Entry","createdAt":"2024-03-22T14:19:37.737Z","updatedAt":"2024-03-22T14:19:37.737Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionProse"}},"locale":"en-US"},"fields":{"internalTitle":"/security/what-is-dast Prose - importance","sectionId":"importance","prose":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5NunZ2KPkK7fgyLrIXnsoU","type":"Entry","createdAt":"2024-03-22T14:19:37.792Z","updatedAt":"2024-10-09T18:32:30.905Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":22,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentProse"}},"locale":"en-US"},"fields":{"internalTitle":"/security/what-is-dast Prose - importance","text":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Dynamic application security testing (DAST) is a method of testing the security of an application while it’s running. DAST tools test web applications during their operating states to find security vulnerabilities using simulated attacks, such as SQL injection, cross-site scripting, and insecure server configuration. This application security (AppSec) testing type mimics a malicious hacker to find security issues in the running application, so developers can fix them before the application is deployed to the public.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Why is DAST important for application security?","nodeType":"text"}],"nodeType":"heading-2"},{"data":{},"content":[{"data":{},"marks":[],"value":"Although billions of dollars have been invested into AppSec tools, 85% of applications still contain known vulnerabilities, with most breaches occurring at the application layer, according to the GitHub ","nodeType":"text"},{"data":{"uri":"https://resources.github.com/security/secure-software-faster-ebook/"},"content":[{"data":{},"marks":[],"value":"software security guide","nodeType":"text"}],"nodeType":"hyperlink"},{"data":{},"marks":[],"value":".","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"DAST tools are a type of security tool that can be used as part of an ","nodeType":"text"},{"data":{"uri":"https://resources.github.com/security/what-is-application-security/"},"content":[{"data":{},"marks":[],"value":"application security program","nodeType":"text"}],"nodeType":"hyperlink"},{"data":{},"marks":[],"value":". DAST assists developers during the software development lifecycle (SDLC) by helping them catch vulnerabilities that can be exploited by malicious attacks. Vulnerabilities can range from simple coding errors to more complex issues such as insecure settings or misconfigured environments. Identifying vulnerabilities early on helps businesses protect against data breaches, tarnished brand reputations, and lost customer trust.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"\n","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"}}}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"100cDONfZh2IoXLXv4KL8z","type":"Entry","createdAt":"2024-03-22T14:19:37.813Z","updatedAt":"2024-03-22T14:19:37.813Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionProse"}},"locale":"en-US"},"fields":{"internalTitle":"/security/what-is-dast Prose - how-does-it-work","sectionId":"how-does-it-work","prose":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3JiUUxzrmTxkSDkQLHopaU","type":"Entry","createdAt":"2024-03-22T14:19:37.832Z","updatedAt":"2024-10-09T18:32:33.423Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":20,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentProse"}},"locale":"en-US"},"fields":{"internalTitle":"/security/what-is-dast Prose - how-does-it-work","text":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"How do DAST tools work?","nodeType":"text"}],"nodeType":"heading-2"},{"data":{},"content":[{"data":{},"marks":[],"value":"DAST tools empower development teams to look at the application from a black-box security perspective, which is very close to the attacker mindset. DAST mimics the same techniques that malicious attackers—who don’t know the application’s infrastructure, architecture, or code—use to find application vulnerabilities. The DAST tool:","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Performs a crawl to pick up on application layer attack points like links, cookies, and URL parameters.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Creates a map of the web applications’ pages and issues.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Audits what it discovered and simulates different kinds of malicious attacks to uncover security vulnerabilities.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Alerts the development team when it finds a vulnerability in an application.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"}],"nodeType":"unordered-list"},{"data":{},"content":[{"data":{},"marks":[],"value":"\n","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"}}}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6ALlpEvJMWcR4hvjVwoOOb","type":"Entry","createdAt":"2024-03-22T14:19:37.892Z","updatedAt":"2024-03-22T14:19:37.892Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionProse"}},"locale":"en-US"},"fields":{"internalTitle":"/security/what-is-dast Prose - types","sectionId":"types","prose":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5kZgRpE7xKzi9U0ebz9NzN","type":"Entry","createdAt":"2024-03-22T14:19:37.912Z","updatedAt":"2024-10-09T18:32:35.921Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":20,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentProse"}},"locale":"en-US"},"fields":{"internalTitle":"/security/what-is-dast Prose - types","text":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Types of DAST","nodeType":"text"}],"nodeType":"heading-2"},{"data":{},"content":[{"data":{},"marks":[],"value":"There are two types of dynamic application security testing. Automated DAST, described in the bullet points above, uses software to scan the application for vulnerabilities and replicate the attacks. For more complex situations, security experts use manual DAST procedures to test for vulnerabilities that automated DAST might miss. To combat sophisticated hackers, development teams might use a combination of both automated and manual DAST.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"Although automated DAST is typically faster and more efficient, it might not be able to identify all vulnerabilities in a web application and may generate false positives. Manual DAST tends to be more accurate because it can be tailored to the web application, but it’s more time consuming and resource intensive.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"\n","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"}}}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2QIdi8nyw1kbofWeMbX5zf","type":"Entry","createdAt":"2024-03-22T14:19:37.932Z","updatedAt":"2024-03-22T14:19:37.932Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionRivers"}},"locale":"en-US"},"fields":{"title":"SEO River - interrupt - Security at every step","rivers":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6cg4LOHwTiQv5VQk5zmJVN","type":"Entry","createdAt":"2024-03-22T14:19:37.992Z","updatedAt":"2024-10-09T15:25:58.717Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":19,"revision":8,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentRiver"}},"locale":"en-US"},"fields":{"title":"SEO River - interrupt - Security at every step","heading":"Security at every step","text":"Find and fix vulnerabilities swiftly with GitHub Advanced Security, ensuring fast remediation rates and seamless integration into your workflow.","media":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6zwk8uklFCQ2qeCWfCFiug","type":"Asset","createdAt":"2022-11-22T21:11:38.392Z","updatedAt":"2024-03-19T11:06:41.098Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":4,"locale":"en-US"},"fields":{"title":"Security - Dark 3","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png","details":{"size":94954,"image":{"width":1200,"height":630}},"fileName":"Security-DarkMode-3 1.png","contentType":"image/png"}}},"align":"end","imageTextRatio":"50:50"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"60wrVO9QVtUbGE4pazWJF7","type":"Entry","createdAt":"2024-03-22T14:19:38.088Z","updatedAt":"2024-03-22T14:19:38.088Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionProse"}},"locale":"en-US"},"fields":{"internalTitle":"/security/what-is-dast Prose - benefits","sectionId":"benefits","prose":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2O9NmKx9a7PW5lpo77r2Wr","type":"Entry","createdAt":"2024-03-22T14:19:38.109Z","updatedAt":"2024-10-09T18:32:41.235Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":34,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentProse"}},"locale":"en-US"},"fields":{"internalTitle":"/security/what-is-dast Prose - benefits","text":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Benefits of DAST","nodeType":"text"}],"nodeType":"heading-2"},{"data":{},"content":[{"data":{},"marks":[],"value":"Also known as a web application vulnerability scanner, DAST scanning helps application development teams safeguard their web applications from the most damaging attacks, including ones that give hackers access to sensitive data such as credit cards and customer information.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"Dynamic application security testing is an effective tool for identifying externally visible security issues and runtime problems that make it possible for hackers to carry out the following web application attacks:","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"SQL injection","nodeType":"text"},{"data":{},"marks":[],"value":", one of the most common types of web-based attacks, where the attacker takes control of the web application’s database.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"User privilege issues attacks ","nodeType":"text"},{"data":{},"marks":[],"value":"where malicious employees gain access to sensitive information.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Memory corruption","nodeType":"text"},{"data":{},"marks":[],"value":", which lets an attacker leak sensitive information or execute code.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Cross-site scripting","nodeType":"text"},{"data":{},"marks":[],"value":", where attackers inject their own code to steal sensitive information.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Insecure server configuration attacks ","nodeType":"text"},{"data":{},"marks":[],"value":"to expose critical or sensitive data.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"}],"nodeType":"unordered-list"},{"data":{},"content":[{"data":{},"marks":[],"value":"After DAST alerts the development team that the scan identified security vulnerabilities, the team works to remediate the issues and protect their company’s brand and customers from the damaging consequences caused by cyberattacks and data breaches.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"DAST Pros\t","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Mimics a real-world malicious hacker to Identify security vulnerabilities that only occur in running applications. Other AppSec tools typically don’t find these issues.\t","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Generates few false positives (reports of vulnerabilities that aren’t present) compared to other methods.\t","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Can be run on any application since it doesn’t need access to source code. Therefore, one DAST tool can support all the development team’s applications.\t","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"}],"nodeType":"unordered-list"},{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"DAST Cons ","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Might require security experts to run tests and interpret reports. ","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Scans might take a long time to complete. ","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Can’t pinpoint the specific location of problematic code because it doesn’t work with the application’s source code.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"}],"nodeType":"unordered-list"},{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"DAST vs SAST","nodeType":"text"}],"nodeType":"heading-2"},{"data":{},"content":[{"data":{},"marks":[],"value":"Dynamic application security testing (DAST) is different from static application security testing (SAST):","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"DAST tools scan programs while they are executing to find security issues in the running application.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"SAST tools scan application source code or binary code when the application is not executing to identify potential vulnerabilities based on design or implementation.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"}],"nodeType":"unordered-list"},{"data":{},"content":[{"data":{},"marks":[],"value":"Some SAST tools even scan code as it’s created. For example, a SAST code scanning product is natively embedded in ","nodeType":"text"},{"data":{"uri":"https://resources.github.com/appsec/"},"content":[{"data":{},"marks":[],"value":"GitHub Advanced Security (GHAS)","nodeType":"text"}],"nodeType":"hyperlink"},{"data":{},"marks":[],"value":" to examine code as it’s written and integrate fixes natively into the developer workflow. This helps developers find and fix security issues in their code earlier to automate and scale application security.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"Developer teams looking to maximize application security use a combination of DAST and SAST tools to test their web applications. This best practice strengthens security by giving developers a comprehensive view of application vulnerabilities, both from an “outside in” hacker perspective with DAST and an “inside out” developer perspective with SAST.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"}}}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3D6aewNanteUD6OdmVFtBN","type":"Entry","createdAt":"2024-03-22T14:19:38.128Z","updatedAt":"2024-03-22T14:19:38.128Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionProse"}},"locale":"en-US"},"fields":{"internalTitle":"/security/what-is-dast Prose - tools","sectionId":"tools","prose":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"37yUY1OWg7aQPl57Tb9g44","type":"Entry","createdAt":"2024-03-22T14:19:38.179Z","updatedAt":"2024-10-09T18:28:08.679Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":22,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentProse"}},"locale":"en-US"},"fields":{"internalTitle":"/security/what-is-dast Prose - tools","text":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"How to use DAST tools","nodeType":"text"}],"nodeType":"heading-2"},{"data":{},"content":[{"data":{},"marks":[],"value":"DAST tests are run in real time to help developers identify and fix security issues before the application is launched. The most effective strategy is to run DAST tests early in the SDLC, when it’s less costly and time-consuming to remediate vulnerabilities. Once the web application is in production, DAST continues to search for vulnerabilities, and sends alerts to the right people when remediation is needed.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[{"type":"bold"}],"value":"Build secure applications with DAST","nodeType":"text"}],"nodeType":"heading-2"},{"data":{},"content":[{"data":{},"marks":[],"value":"Web application cyberattacks are serious threats to businesses. By mimicking a malicious attacker who is trying to break into an application to steal data, DAST scanning exposes the most damaging security vulnerabilities, so development teams can fix them before the application is launched into production.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"Using tools like DAST to stay ahead of security issues is a key component of ","nodeType":"text"},{"data":{"uri":"https://github.com/features/security"},"content":[{"data":{},"marks":[],"value":"GitHub Security","nodeType":"text"}],"nodeType":"hyperlink"},{"data":{},"marks":[],"value":". Designed to help developers take a proactive security approach, GitHub Security natively embeds security tools directly into the ","nodeType":"text"},{"data":{"uri":"https://resources.github.com/devops/"},"content":[{"data":{},"marks":[],"value":"DevOps","nodeType":"text"}],"nodeType":"hyperlink"},{"data":{},"marks":[],"value":" workflow, including:","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"","nodeType":"text"},{"data":{"uri":"https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/about-code-scanning"},"content":[{"data":{},"marks":[],"value":"Code scanning","nodeType":"text"}],"nodeType":"hyperlink"},{"data":{},"marks":[],"value":" scans for security issues as code is written and integrates fixes natively into the developer workflow.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"","nodeType":"text"},{"data":{"uri":"https://docs.github.com/en/code-security/secret-scanning/about-secret-scanning"},"content":[{"data":{},"marks":[],"value":"Secret scanning","nodeType":"text"}],"nodeType":"hyperlink"},{"data":{},"marks":[],"value":" prevents fraudulent use of leaked secrets that may have accidentally been pushed into code.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"","nodeType":"text"},{"data":{"uri":"https://docs.github.com/en/code-security/supply-chain-security/understanding-your-software-supply-chain/about-supply-chain-security"},"content":[{"data":{},"marks":[],"value":"Supply chain security","nodeType":"text"}],"nodeType":"hyperlink"},{"data":{},"marks":[],"value":" uses software composition analysis to catch vulnerable dependencies before they’re introduced into the codebase.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"","nodeType":"text"},{"data":{"uri":"https://docs.github.com/en/code-security/security-overview/about-the-security-overview"},"content":[{"data":{},"marks":[],"value":"Security overview","nodeType":"text"}],"nodeType":"hyperlink"},{"data":{},"marks":[],"value":" provides a centralized, single view of security risks across the entire enterprise.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"}],"nodeType":"unordered-list"},{"data":{},"content":[{"data":{},"marks":[],"value":"In addition, third-party security capabilities are available through ","nodeType":"text"},{"data":{"uri":"https://github.com/features/actions"},"content":[{"data":{},"marks":[],"value":"GitHub Actions","nodeType":"text"}],"nodeType":"hyperlink"},{"data":{},"marks":[],"value":", to give developers the freedom and extensibility to automate, customize, and execute their software workflows in the same place they code. This functionality empowers developers to use third-party SAST engines, DAST, infrastructure as code scanning (IaC), and container scanning.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"Together, GitHub Security, DAST, and third-party tools empower developer teams to secure their software and custom code across the software lifecycle.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"\n","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"}}}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"45uImUhiKn4bvMPmlridss","type":"Entry","createdAt":"2024-03-22T14:19:38.288Z","updatedAt":"2024-10-09T18:16:59.389Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":21,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionFAQ"}},"locale":"en-US"},"fields":{"title":"/security/what-is-dast FAQs","sectionId":"faqs","heading":"Frequently asked questions","faqBlocks":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Mko2iRTqnjl2qY35gx38E","type":"Entry","createdAt":"2024-03-22T14:19:38.597Z","updatedAt":"2024-03-22T14:19:38.597Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentFAQBlock"}},"locale":"en-US"},"fields":{"title":"/security/what-is-dast FAQs","questions":[]}}]}}]}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"tthW9cWByfuwGbyjSc1Tu","type":"Entry","createdAt":"2023-03-21T15:28:33.620Z","updatedAt":"2024-05-07T16:54:33.136Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":17,"revision":7,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{"metaTitle":"What is dynamics application security testing (DAST)? - GitHub Resources","metaDescription":"DAST is an AppSec method that simulates attacks to test web apps for security issues.","openGraphTitle":"What is Dynamic Application Security Testing (DAST)? | GitHub Resources","openGraphDescription":"Dynamic application security testing (DAST) is an AppSec method that tests applications during their running states for vulnerabilities using simulated attacks."}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6x73F1EdA0d8RSTsXImhQx","type":"Entry","createdAt":"2024-04-09T15:38:47.347Z","updatedAt":"2024-04-09T15:38:47.347Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/the-thing-about-secrets-why-detection-is-not-enough","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2ItlvSvbkVC7MfEZfAPvmg","type":"Entry","createdAt":"2024-04-09T15:38:22.969Z","updatedAt":"2024-10-03T12:42:27.866Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":33,"revision":8,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"Resource Page for /the-thing-about-secrets-why-detection-is-not-enough","title":"The thing about Secrets - Why detection is not enough","description":"While secrets shouldn’t be in code, they often are... so what's next?","body":"Finding secrets in code can be an easy enough task, but is the fix easy? Where do we actually put them? Is there a next best step? How many secrets are actually in our repos? \n\nJoin this webinar where we’ll explore some common challenges that teams face, some options and a discussion around making things better.\n\nWe’ll also have a live Q\u0026A at the end of the session, where you’ll have the opportunity to ask our experts your questions in real time.\n","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4dbkfteJcFOFzxEVq9nYwn","type":"Entry","createdAt":"2024-04-09T02:54:38.573Z","updatedAt":"2024-04-09T02:54:38.573Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"event"}},"locale":"en-US"},"fields":{"startTime":"2024-04-30T14:00+11:00","endTime":"2024-04-30T16:00+11:00"}},"gated":false,"sfCampaignID":"7015c000001ijzTAAQ","campaign":"2024q4-wbr-APAC-Secret-Detection","contentForm":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"600bbq5DhOwybc3yBeFDGI","type":"Entry","createdAt":"2022-03-14T00:23:20.654Z","updatedAt":"2024-11-26T11:29:40.061Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":130,"revision":57,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"form"}},"locale":"en-US"},"fields":{"name":"form-webcast-signup","title":"Sign Up to Join","subtitle":" ","eloquaFormName":"Webinar_TemplateForm","formCTA":"Register","formElements":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1oc1nNacqE77XQSuJXaNdl","type":"Entry","createdAt":"2022-03-12T20:17:06.911Z","updatedAt":"2024-11-26T11:37:42.078Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":281,"revision":138,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Work Email Address","htmlName":"emailAddress","type":"email","placeholder":"you@example.com","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6FMPEpNvfZnVg5o5pNdmAz","type":"Entry","createdAt":"2023-04-04T12:27:23.053Z","updatedAt":"2024-11-26T11:37:14.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":373,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"First name","htmlName":"firstName","type":"text","placeholder":"First name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Euizanl72D7hjUPBu1cz4","type":"Entry","createdAt":"2023-04-04T12:27:44.815Z","updatedAt":"2024-11-26T11:37:30.225Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":372,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Last name","htmlName":"lastName","type":"text","placeholder":"Last name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"40sP3SIDeLJIKo7gAvmAdv","type":"Entry","createdAt":"2022-03-12T20:30:16.766Z","updatedAt":"2024-11-26T11:37:50.340Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":264,"revision":130,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Job Title","htmlName":"title","type":"text","placeholder":"Job Title","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5HOQnFx9120Wj4hlsjXaJn","type":"Entry","createdAt":"2022-03-12T20:19:03.843Z","updatedAt":"2024-11-26T11:37:58.388Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":374,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Company","htmlName":"company","type":"text","placeholder":"Acme, Inc","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5zNCZ4hVsez1AWpp6Fga7h","type":"Entry","createdAt":"2022-03-12T20:23:32.191Z","updatedAt":"2024-11-20T14:58:44.487Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCustomerGUID","type":"hidden","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7a3HDjJcLkWmsPKHATLvna","type":"Entry","createdAt":"2022-03-12T20:24:00.556Z","updatedAt":"2024-11-20T14:58:44.527Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":18,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCookieWrite","type":"hidden","required":false,"defaultValue":"0"}}]}},"headerImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5HOWeairuJfv1Rip9qEC2J","type":"Asset","createdAt":"2024-04-09T03:06:40.116Z","updatedAt":"2024-04-09T03:18:16.132Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"locale":"en-US"},"fields":{"title":"1200x630-The Thing about secrets landing page hero","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/5HOWeairuJfv1Rip9qEC2J/095e5ea6761a247cc615c8c7b13c25de/1200x630-The_Thing_about_secrets_landing_page_hero.png","details":{"size":271619,"image":{"width":1200,"height":630}},"fileName":"1200x630-The Thing about secrets landing page hero.png","contentType":"image/png"}}},"publicationDate":"2024-03-22T00:00","renderedDate":"30 Apr 2024 | 9:30am IST / 12:00pm SGT / 2:00pm AEST","hidden":false,"rendersRichText":false,"marketoCampaign":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1UAOy4K4inH5VGrfELknaq","type":"Entry","createdAt":"2024-04-09T15:38:12.679Z","updatedAt":"2024-04-09T15:52:49.232Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"marketoCampaign"}},"locale":"en-US"},"fields":{"title":"433223","cDLProgramName":"433223","source":"Owned Event: Webinar","formFields":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"bY1toaC1jk9iKFTsHBwFd","type":"Entry","createdAt":"2023-09-12T16:44:56.720Z","updatedAt":"2024-10-03T13:13:47.754Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":28,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"sFDCLastCampaignStatus","htmlName":"sFDCLastCampaignStatus","type":"hidden","required":false,"defaultValue":"Registered"}}],"active":true}}}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1CerzELOcAgf34sW79kcdJ","type":"Entry","createdAt":"2024-04-09T15:35:56.479Z","updatedAt":"2024-05-02T11:20:24.759Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":4,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{"metaTitle":"The thing about Secrets - Why detection is not enough","metaDescription":"The thing about Secrets - Why detection is not enough"}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2BS9ZCzjrRRotXE4hHlbsg","type":"Entry","createdAt":"2023-08-24T13:17:13.360Z","updatedAt":"2024-02-21T16:26:35.229Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/webcasts/advanced-security-and-copilot","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1tXC3w7cN89fkSMxLmGcWk","type":"Entry","createdAt":"2022-11-15T21:32:37.530Z","updatedAt":"2024-10-03T12:48:21.651Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":74,"revision":18,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"Resource Page for /webcasts/advanced-security-and-copilot","path":"/webcasts/advanced-security-and-copilot","title":"Copilot and GitHub Advanced security","description":"How Copilot and GitHub Advanced security could revolutionize appsec","body":"\n# Copilot and GitHub Advanced security\n\nIn this session, we discussed our developer-empowering security solutions and how:\n- How GitHub is approaching application, security\n- How Github is trying to unify the other pieces of technologies to empower the developer to do the best work\n- How GHAS and co-pilot work together to help a developer efficiently fix a security issue.\n","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"01eIjn0VqQ146T4XxLCQrK","type":"Entry","createdAt":"2022-11-15T21:19:11.010Z","updatedAt":"2023-03-07T15:33:19.156Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"video"}},"locale":"en-US"},"fields":{"speakers":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5k1pOxsMkAuNMS7t9Jq6rV","type":"Entry","createdAt":"2021-11-19T17:44:41.699Z","updatedAt":"2024-10-09T18:56:31.932Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":38,"revision":18,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Niroshan Rajadurai","avatar":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5To28naAfB9JwV9viMTn2B","type":"Asset","createdAt":"2021-11-19T17:44:33.428Z","updatedAt":"2021-11-19T17:44:33.428Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"locale":"en-US"},"fields":{"title":"assets/img/avatars/niroshan.jpeg","description":"assets/img/avatars/niroshan.jpeg","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/5To28naAfB9JwV9viMTn2B/f9a6d56374df8dfd19e27efcbe6954c4/assets_img_avatars_niroshan.jpeg","details":{"size":25187,"image":{"width":460,"height":460}},"fileName":"assets/img/avatars/niroshan.jpeg","contentType":"image/jpeg"}}},"title":"Sr. Director GitHub Advanced Security","company":"GitHub"}}],"isWebcast":false}},"gated":true,"gatedContent":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"oidjB8J6jj1hPJzgm8qF6","type":"Entry","createdAt":"2022-11-15T21:24:16.102Z","updatedAt":"2024-10-03T13:12:48.395Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":28,"revision":9,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"gatedContent"}},"locale":"en-US"},"fields":{"path":"webcasts/advanced-security-and-copilot","description":"How Copilot and GitHub Advanced Security Could Revolutionise AppSec","body":"\u003cdiv class=\"embed-responsive embed-responsive-16by9\"\u003e\u003ciframe src=\"https://player.vimeo.com/video/776351390?h=db7e60e526\u0026title=0\u0026byline=0\u0026portrait=0\u0026speed=0\u0026badge=0\u0026autopause=0\u0026player_id=0\u0026app_id=58479/embed\" allow=\"autoplay; fullscreen; picture-in-picture\" allowfullscreen frameborder=\"0\"\u003e\u003c/iframe\u003e\u003c/div\u003e","lang":"en"}},"sfCampaignID":"7015c0000023NziAAE","campaign":"2023q2-Recorded Webinar- advanced-security-and-copilot","contentForm":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2h0p98dZi8OlxOyXNA1nGU","type":"Entry","createdAt":"2022-08-25T19:01:44.094Z","updatedAt":"2024-11-26T11:30:09.749Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":128,"revision":56,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"form"}},"locale":"en-US"},"fields":{"name":"Gated video page generic form","title":"Sign up to watch","subtitle":"Tell us a bit about you","eloquaFormName":"ContentReg_TemplateForm","formCTA":"Watch the session","formElements":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6FMPEpNvfZnVg5o5pNdmAz","type":"Entry","createdAt":"2023-04-04T12:27:23.053Z","updatedAt":"2024-11-26T11:37:14.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":373,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"First name","htmlName":"firstName","type":"text","placeholder":"First name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Euizanl72D7hjUPBu1cz4","type":"Entry","createdAt":"2023-04-04T12:27:44.815Z","updatedAt":"2024-11-26T11:37:30.225Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":372,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Last name","htmlName":"lastName","type":"text","placeholder":"Last name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1oc1nNacqE77XQSuJXaNdl","type":"Entry","createdAt":"2022-03-12T20:17:06.911Z","updatedAt":"2024-11-26T11:37:42.078Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":281,"revision":138,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Work Email Address","htmlName":"emailAddress","type":"email","placeholder":"you@example.com","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5HOQnFx9120Wj4hlsjXaJn","type":"Entry","createdAt":"2022-03-12T20:19:03.843Z","updatedAt":"2024-11-26T11:37:58.388Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":374,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Company","htmlName":"company","type":"text","placeholder":"Acme, Inc","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"40sP3SIDeLJIKo7gAvmAdv","type":"Entry","createdAt":"2022-03-12T20:30:16.766Z","updatedAt":"2024-11-26T11:37:50.340Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":264,"revision":130,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Job Title","htmlName":"title","type":"text","placeholder":"Job Title","required":true}}]}},"headerImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6zwk8uklFCQ2qeCWfCFiug","type":"Asset","createdAt":"2022-11-22T21:11:38.392Z","updatedAt":"2024-03-19T11:06:41.098Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":4,"locale":"en-US"},"fields":{"title":"Security - Dark 3","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png","details":{"size":94954,"image":{"width":1200,"height":630}},"fileName":"Security-DarkMode-3 1.png","contentType":"image/png"}}},"headerCTA":"Watch Video","buttonCTA":"Watch Video","publicationDate":"2022-08-10T00:00+00:00","renderedDate":"August 2022","hidden":false,"rendersRichText":false,"marketoCampaign":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1jLUnd2m2MZWlSKSJRoNtJ","type":"Entry","createdAt":"2023-09-14T20:48:34.122Z","updatedAt":"2024-06-20T19:55:13.193Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"marketoCampaign"}},"locale":"en-US"},"fields":{"title":"CO-GHAI-WBNR-FY23-10Oct-01-Advanced-Security-and-Copilot/407925","cDLProgramName":"407925","source":"Owned Event: Webinar","formFields":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"bY1toaC1jk9iKFTsHBwFd","type":"Entry","createdAt":"2023-09-12T16:44:56.720Z","updatedAt":"2024-10-03T13:13:47.754Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":28,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"sFDCLastCampaignStatus","htmlName":"sFDCLastCampaignStatus","type":"hidden","required":false,"defaultValue":"Registered"}}],"active":true}}}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"e6kkATty8WptKxPLcrkaI","type":"Entry","createdAt":"2022-08-25T02:21:46.010Z","updatedAt":"2022-11-30T17:25:08.090Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5R9zfL5sHOvIqOX4WnG1mJ","type":"Entry","createdAt":"2024-01-11T21:00:30.758Z","updatedAt":"2024-11-26T10:53:17.315Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":85,"revision":44,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"github-advanced-security","label":"GitHub Advanced Security"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"11z5voxA8sxkRTfMq53G7F","type":"Entry","createdAt":"2023-08-24T13:17:29.216Z","updatedAt":"2024-02-21T16:27:35.338Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/webcasts/amer-appsectalk","seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4yOqfd92RL8MGNETekH13C","type":"Entry","createdAt":"2022-10-10T18:57:08.325Z","updatedAt":"2024-10-03T13:08:45.379Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{"metaTitle":"Join our Proactive vs. Reactive AppSec GitHub Talk ","metaDescription":"Join our AppSec GitHub Talk where we discuss how to shift from a reactive to a proactive security approach–empowering you to get secure software out the door, fast. "}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"fll61BFSn5fdDSsZ6r1zC","type":"Entry","createdAt":"2024-10-25T17:22:19.257Z","updatedAt":"2024-11-01T18:09:04.332Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/webcasts/found-means-fixed-with-ai-powered-application-security","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"bZ6FlEfAmpppgQB4NsqvG","type":"Entry","createdAt":"2024-10-25T17:22:19.344Z","updatedAt":"2024-10-25T17:22:19.344Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"containerLandingPage"}},"locale":"en-US"},"fields":{"title":"/webcasts/found-means-fixed-with-ai-powered-application-security","sections":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7kKBAIAc5yXhXh0OSzTATa","type":"Entry","createdAt":"2024-10-25T17:22:19.361Z","updatedAt":"2024-10-25T17:28:02.476Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionHero"}},"locale":"en-US"},"fields":{"title":"/webcasts/found-means-fixed-with-ai-powered-application-security Hero","hero":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2LCPrPfM3BiLGIDQMqMTrs","type":"Entry","createdAt":"2024-10-25T17:22:19.388Z","updatedAt":"2024-11-26T11:11:50.983Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":35,"revision":17,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentHero"}},"locale":"en-US"},"fields":{"title":"/webcasts/found-means-fixed-with-ai-powered-application-security Hero","heading":"Found means fixed with AI-powered application security","align":"Center"}},"backgroundImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1vs735TqdYuHt9lmfa3PLM","type":"Asset","createdAt":"2024-10-25T17:28:11.439Z","updatedAt":"2024-10-25T17:30:32.880Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"locale":"en-US"},"fields":{"title":"AI Background - Artificial Intelligence pillar - Light 5","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/1vs735TqdYuHt9lmfa3PLM/d2641ea12379b185faf7a25ab57091f4/AI_Background_-_Artificial_Intelligence_pillar_-_Light_5_1.webp","details":{"size":118224,"image":{"width":2400,"height":1350}},"fileName":"AI_Background_-_Artificial_Intelligence_pillar_-_Light_5 1.webp","contentType":"image/webp"}}},"theme":"light"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5VxacugLVatjBJkzMWFGTH","type":"Entry","createdAt":"2024-10-25T17:22:19.402Z","updatedAt":"2024-10-25T17:22:19.402Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionProse"}},"locale":"en-US"},"fields":{"internalTitle":"/webcasts/found-means-fixed-with-ai-powered-application-security Prose","prose":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5U9ip3svCftjYkLVYLAHXX","type":"Entry","createdAt":"2024-10-25T17:22:19.493Z","updatedAt":"2024-11-26T10:55:55.479Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":38,"revision":17,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentProse"}},"locale":"en-US"},"fields":{"internalTitle":"/webcasts/found-means-fixed-with-ai-powered-application-security Prose","text":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"At GitHub, we believe application security tooling must go beyond alerting—it should also help you fast-track remediation. Enter “Found means fixed,” our vision for AI-powered security. Identifying vulnerabilities is the first step; effectively fixing them is how you’ll make a significant impact.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"In this webinar: ","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Learn the latest enhancements to code scanning and secret scanning to empower your DevSecOps teams with seamless workflows that integrate detection and remediation in real time.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Discover real-world examples, best practices, and insights into how organizations can embed this mindset and practice into their development culture. ","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"},{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Understand why adopting the “Found means fixed” philosophy enhances your security posture, fosters collaboration between development and security teams, and ultimately helps protect your organization from potential breaches.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"list-item"}],"nodeType":"unordered-list"},{"data":{},"content":[{"data":{},"marks":[],"value":"\n","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"Sign up to learn how together we can transform your approach to security","nodeType":"text"}],"nodeType":"heading-2"},{"data":{},"content":[{"data":{},"marks":[],"value":"","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"}}}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"35ap4nBp8yuBI719eCOtJ4","type":"Entry","createdAt":"2024-10-25T17:22:19.513Z","updatedAt":"2024-10-25T17:22:19.513Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"sectionCards"}},"locale":"en-US"},"fields":{"title":"/webcasts/found-means-fixed-with-ai-powered-application-security Cards","cards":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"OD7wD9rFyFDouKzUtc1Bq","type":"Entry","createdAt":"2024-10-25T17:22:19.527Z","updatedAt":"2024-10-25T17:22:19.527Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"layoutComponentCards"}},"locale":"en-US"},"fields":{"title":"/webcasts/found-means-fixed-with-ai-powered-application-security Cards","cards":[]}}}}]}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"FQczWhSUFsBArnuu41twU","type":"Entry","createdAt":"2024-10-25T17:22:19.637Z","updatedAt":"2024-10-25T17:22:19.637Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1W2ZAgfSK2jhEsyHPYV3ic","type":"Entry","createdAt":"2024-01-11T21:00:29.315Z","updatedAt":"2024-11-26T10:53:50.537Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":170,"revision":86,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"ai","label":"AI"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}}],"settings":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1PhDMQC5mqDPXXF8jKa81C","type":"Entry","createdAt":"2024-10-25T17:22:19.691Z","updatedAt":"2024-11-01T18:24:28.889Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"Page Settings for /webcasts/found-means-fixed-with-ai-powered-application-security","hasMinimalFooter":false,"isHidden":false,"revenuePlay":"Security"}}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"q0G4E3SXVzkPpkEFMWZYI","type":"Entry","createdAt":"2024-10-25T17:37:13.880Z","updatedAt":"2024-10-25T17:51:02.496Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/webcasts/found-means-fixed-with-ai-powered-application-security-amer","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"76W59M39F1BquOoT8QJsk0","type":"Entry","createdAt":"2024-10-25T17:37:13.979Z","updatedAt":"2024-11-26T11:05:33.743Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":53,"revision":22,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"Resource Page for /webcasts/found-means-fixed-with-ai-powered-application-security-amer","title":"Found means fixed with AI-powered application security - Americas","description":"At GitHub, we believe application security tooling must go beyond alerting—it should also help you fast-track remediation. Enter “Found means fixed,” our vision for AI-powered security. Identifying vulnerabilities is the first step; effectively fixing them is how you’ll make a significant impact.","body":"In this webinar: \n\n- Learn the latest enhancements to code scanning and secret scanning to empower your DevSecOps teams with seamless workflows that integrate detection and remediation in real time.\n- Discover real-world examples, best practices, and insights into how organizations can embed this mindset and practice into their development culture. \n- Understand why adopting the “Found means fixed” philosophy enhances your security posture, fosters collaboration between development and security teams, and ultimately helps protect your organization from potential breaches.\n\nSign up to learn how together we can transform your approach to security.","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5SZNfF6OtPdhkTMJJB7WnT","type":"Entry","createdAt":"2024-10-25T17:37:14.013Z","updatedAt":"2024-11-12T18:18:57.538Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"event"}},"locale":"en-US"},"fields":{"startTime":"2024-11-21T00:00-04:00","endTime":"2024-11-22T00:00-04:00","speakers":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4cRKmYT0YqlvVj5lZFpn5H","type":"Entry","createdAt":"2023-03-22T22:28:24.379Z","updatedAt":"2024-11-26T11:53:11.703Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":62,"revision":28,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Charlie Rice","avatar":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4GkWwqcILWvwWbdQ992CQX","type":"Asset","createdAt":"2023-03-22T22:27:33.555Z","updatedAt":"2023-03-22T22:27:33.555Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Charlie Rice","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/4GkWwqcILWvwWbdQ992CQX/b72b6d370aec88e0d1ff4f9e404e919d/image1.jpg","details":{"size":38873,"image":{"width":512,"height":512}},"fileName":"image1.jpg","contentType":"image/jpeg"}}},"title":"Principal Field Security Specialist","company":"GitHub"}}],"eventType":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4q6Ypgv15uNorbHXenDRYR","type":"Entry","createdAt":"2024-09-17T20:42:02.901Z","updatedAt":"2024-09-17T20:42:02.901Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"eventType"}},"locale":"en-US"},"fields":{"title":"Event type: webinar","text":"webinar"}}}},"gated":false,"sfCampaignID":"7015c000001ioaxAAA","campaign":"2025q2-wbr-AMER-Found-Means-Fixed-GHSC","contentForm":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5j43KEziEl7ouP9IembYNq","type":"Entry","createdAt":"2023-08-29T15:03:55.525Z","updatedAt":"2024-11-26T11:30:26.413Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":55,"revision":26,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"form"}},"locale":"en-US"},"fields":{"name":"form-webcast-signup \"Register now\"","title":"Register now","subtitle":" ","eloquaFormName":"Webinar_TemplateForm","formCTA":"Register","formElements":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1oc1nNacqE77XQSuJXaNdl","type":"Entry","createdAt":"2022-03-12T20:17:06.911Z","updatedAt":"2024-11-26T11:37:42.078Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":281,"revision":138,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Work Email Address","htmlName":"emailAddress","type":"email","placeholder":"you@example.com","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6FMPEpNvfZnVg5o5pNdmAz","type":"Entry","createdAt":"2023-04-04T12:27:23.053Z","updatedAt":"2024-11-26T11:37:14.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":373,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"First name","htmlName":"firstName","type":"text","placeholder":"First name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Euizanl72D7hjUPBu1cz4","type":"Entry","createdAt":"2023-04-04T12:27:44.815Z","updatedAt":"2024-11-26T11:37:30.225Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":372,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Last name","htmlName":"lastName","type":"text","placeholder":"Last name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"40sP3SIDeLJIKo7gAvmAdv","type":"Entry","createdAt":"2022-03-12T20:30:16.766Z","updatedAt":"2024-11-26T11:37:50.340Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":264,"revision":130,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Job Title","htmlName":"title","type":"text","placeholder":"Job Title","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5HOQnFx9120Wj4hlsjXaJn","type":"Entry","createdAt":"2022-03-12T20:19:03.843Z","updatedAt":"2024-11-26T11:37:58.388Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":374,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Company","htmlName":"company","type":"text","placeholder":"Acme, Inc","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5zNCZ4hVsez1AWpp6Fga7h","type":"Entry","createdAt":"2022-03-12T20:23:32.191Z","updatedAt":"2024-11-20T14:58:44.487Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCustomerGUID","type":"hidden","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7a3HDjJcLkWmsPKHATLvna","type":"Entry","createdAt":"2022-03-12T20:24:00.556Z","updatedAt":"2024-11-20T14:58:44.527Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":18,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCookieWrite","type":"hidden","required":false,"defaultValue":"0"}}]}},"headerImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2Kb0VNQ5RFbALb12Q0ZATk","type":"Asset","createdAt":"2024-10-25T17:37:13.850Z","updatedAt":"2024-10-25T17:37:13.850Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Found means fixed with AI-powered application security Thursday, Nov 21 at 11am ET","description":"Found means fixed with AI-powered application security Thursday, Nov 21 at 11am ET","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/2Kb0VNQ5RFbALb12Q0ZATk/bac048a80cb945e0bb6b0f85c75bd7b6/Landing_page_header_1200x630__3_.png","details":{"size":981320,"image":{"width":2400,"height":1260}},"fileName":"Landing page header 1200x630 (3).png","contentType":"image/png"}}},"headerCTA":"Register","buttonCTA":"Register","publicationDate":"2024-10-25T00:00","renderedDate":"Thursday, Nov 21 at 11am ET","hidden":false,"rendersRichText":false,"marketoCampaign":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6LXCp2keeTrKeoaUXqjbzk","type":"Entry","createdAt":"2024-10-31T19:21:58.376Z","updatedAt":"2024-10-31T19:21:58.376Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"marketoCampaign"}},"locale":"en-US"},"fields":{"title":"CO-GHS-WBNR-FY25-10Oct-31-Found means fixed regional webinar AMER 8032 / 460026","cDLProgramName":"460026","source":"Owned Event: Webinar","formFields":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"bY1toaC1jk9iKFTsHBwFd","type":"Entry","createdAt":"2023-09-12T16:44:56.720Z","updatedAt":"2024-10-03T13:13:47.754Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":28,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"sFDCLastCampaignStatus","htmlName":"sFDCLastCampaignStatus","type":"hidden","required":false,"defaultValue":"Registered"}}],"active":true}}}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2H7GwNAzHEz0f9hyhgKJow","type":"Entry","createdAt":"2024-10-25T17:37:14.044Z","updatedAt":"2024-11-26T11:10:12.575Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":39,"revision":18,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{"metaTitle":"Found Means Fixed: AI-Powered Application Security Webinar","metaDescription":"Join our webinar to explore GitHub's \"Found means fixed\" vision for AI-powered application security. Learn how to enhance your DevSecOps workflows, implement best practices, and improve your organization’s security posture.","metaImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2Kb0VNQ5RFbALb12Q0ZATk","type":"Asset","createdAt":"2024-10-25T17:37:13.850Z","updatedAt":"2024-10-25T17:37:13.850Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Found means fixed with AI-powered application security Thursday, Nov 21 at 11am ET","description":"Found means fixed with AI-powered application security Thursday, Nov 21 at 11am ET","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/2Kb0VNQ5RFbALb12Q0ZATk/bac048a80cb945e0bb6b0f85c75bd7b6/Landing_page_header_1200x630__3_.png","details":{"size":981320,"image":{"width":2400,"height":1260}},"fileName":"Landing page header 1200x630 (3).png","contentType":"image/png"}}},"openGraphTitle":"Found Means Fixed: AI-Powered Application Security Webinar","openGraphDescription":"Discover GitHub’s vision for AI-powered security and learn how to enhance your application security practices. Sign up for the webinar!"}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1W2ZAgfSK2jhEsyHPYV3ic","type":"Entry","createdAt":"2024-01-11T21:00:29.315Z","updatedAt":"2024-11-26T10:53:50.537Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":170,"revision":86,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"ai","label":"AI"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}}],"settings":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"n95DPGUte3CmwRNNua90A","type":"Entry","createdAt":"2024-10-25T17:37:14.060Z","updatedAt":"2024-11-01T18:23:51.697Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"Page Settings for /webcasts/found-means-fixed-with-ai-powered-application-security-amer","hasMinimalFooter":false,"isHidden":false,"revenuePlay":"Security"}}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6eZpTNLrhMbzDTjTR9scpz","type":"Entry","createdAt":"2024-10-25T17:50:32.304Z","updatedAt":"2024-10-25T17:50:32.304Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/webcasts/found-means-fixed-with-ai-powered-application-security-apac","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2qhqZcBV4UOUfFGNTQDPFd","type":"Entry","createdAt":"2024-10-25T17:50:32.403Z","updatedAt":"2024-11-26T11:05:43.268Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":48,"revision":21,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"Resource Page for /webcasts/found-means-fixed-with-ai-powered-application-security-apac","title":"Found means fixed with AI-powered application security - Asia Pacific","description":"At GitHub, we believe application security tooling must go beyond alerting—it should also help you fast-track remediation. Enter “Found means fixed,” our vision for AI-powered security. Identifying vulnerabilities is the first step; effectively fixing them is how you’ll make a significant impact.","body":"In this webinar: \n\n- Learn the latest enhancements to code scanning and secret scanning to empower your DevSecOps teams with seamless workflows that integrate detection and remediation in real time.\n- Discover real-world examples, best practices, and insights into how organizations can embed this mindset and practice into their development culture. \n- Understand why adopting the “Found means fixed” philosophy enhances your security posture, fosters collaboration between development and security teams, and ultimately helps protect your organization from potential breaches.\n\nSign up to learn how together we can transform your approach to security.\n","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6Wuj9wny1Kjy5xjhtYHGmp","type":"Entry","createdAt":"2024-10-25T17:50:32.448Z","updatedAt":"2024-11-12T18:19:23.732Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"event"}},"locale":"en-US"},"fields":{"startTime":"2024-11-21T00:00-04:00","endTime":"2024-11-22T00:00-04:00","speakers":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3qABVxh3xGgvOQa4DZb8xR","type":"Entry","createdAt":"2024-11-05T20:07:48.147Z","updatedAt":"2024-11-26T11:53:03.699Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":28,"revision":13,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Stu Eggerton","avatar":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"QVEo2nUpOgbURDRQGmfOx","type":"Asset","createdAt":"2024-11-05T20:07:48.044Z","updatedAt":"2024-11-05T20:07:48.044Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"locale":"en-US"},"fields":{"title":"Stu Eggerton","description":"Stu Eggerton","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/QVEo2nUpOgbURDRQGmfOx/5de5294a0aee89f2c370e28134af24ad/25424433.jpg","details":{"size":8832,"image":{"width":270,"height":270}},"fileName":"25424433.jpg","contentType":"image/jpeg"}}},"title":"Senior Customer Success Architect","company":"GitHub"}}],"eventType":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4q6Ypgv15uNorbHXenDRYR","type":"Entry","createdAt":"2024-09-17T20:42:02.901Z","updatedAt":"2024-09-17T20:42:02.901Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"eventType"}},"locale":"en-US"},"fields":{"title":"Event type: webinar","text":"webinar"}}}},"gated":false,"sfCampaignID":"7015c000001ioasAAA","campaign":"2025q2-wbr-APAC-Found-Means-Fixed-GHSC","contentForm":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5j43KEziEl7ouP9IembYNq","type":"Entry","createdAt":"2023-08-29T15:03:55.525Z","updatedAt":"2024-11-26T11:30:26.413Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":55,"revision":26,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"form"}},"locale":"en-US"},"fields":{"name":"form-webcast-signup \"Register now\"","title":"Register now","subtitle":" ","eloquaFormName":"Webinar_TemplateForm","formCTA":"Register","formElements":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1oc1nNacqE77XQSuJXaNdl","type":"Entry","createdAt":"2022-03-12T20:17:06.911Z","updatedAt":"2024-11-26T11:37:42.078Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":281,"revision":138,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Work Email Address","htmlName":"emailAddress","type":"email","placeholder":"you@example.com","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6FMPEpNvfZnVg5o5pNdmAz","type":"Entry","createdAt":"2023-04-04T12:27:23.053Z","updatedAt":"2024-11-26T11:37:14.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":373,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"First name","htmlName":"firstName","type":"text","placeholder":"First name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Euizanl72D7hjUPBu1cz4","type":"Entry","createdAt":"2023-04-04T12:27:44.815Z","updatedAt":"2024-11-26T11:37:30.225Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":372,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Last name","htmlName":"lastName","type":"text","placeholder":"Last name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"40sP3SIDeLJIKo7gAvmAdv","type":"Entry","createdAt":"2022-03-12T20:30:16.766Z","updatedAt":"2024-11-26T11:37:50.340Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":264,"revision":130,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Job Title","htmlName":"title","type":"text","placeholder":"Job Title","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5HOQnFx9120Wj4hlsjXaJn","type":"Entry","createdAt":"2022-03-12T20:19:03.843Z","updatedAt":"2024-11-26T11:37:58.388Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":374,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Company","htmlName":"company","type":"text","placeholder":"Acme, Inc","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5zNCZ4hVsez1AWpp6Fga7h","type":"Entry","createdAt":"2022-03-12T20:23:32.191Z","updatedAt":"2024-11-20T14:58:44.487Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCustomerGUID","type":"hidden","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7a3HDjJcLkWmsPKHATLvna","type":"Entry","createdAt":"2022-03-12T20:24:00.556Z","updatedAt":"2024-11-20T14:58:44.527Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":18,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCookieWrite","type":"hidden","required":false,"defaultValue":"0"}}]}},"headerImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4Yo12QyqsFVi21vuHzmDAm","type":"Asset","createdAt":"2024-10-25T17:50:32.280Z","updatedAt":"2024-10-25T17:50:32.280Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Found means fixed with AI-powered application security Thursday, Nov 21 at 3pm AEDT","description":"Found means fixed with AI-powered application security Thursday, Nov 21 at 3pm AEDT","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/4Yo12QyqsFVi21vuHzmDAm/50c188600790362f618f370ff76b4ba8/Landing_page_header_1200x630__5_.png","details":{"size":982470,"image":{"width":2400,"height":1260}},"fileName":"Landing page header 1200x630 (5).png","contentType":"image/png"}}},"headerCTA":"Register","buttonCTA":"Register","publicationDate":"2024-10-25T00:00","renderedDate":"Thursday, Nov 21 at 3pm AEDT","hidden":false,"rendersRichText":false,"marketoCampaign":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7rIayDT0WwAyvDoqGldPUf","type":"Entry","createdAt":"2024-10-31T19:07:05.433Z","updatedAt":"2024-10-31T19:07:05.433Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"marketoCampaign"}},"locale":"en-US"},"fields":{"title":"CO-GHS-WBNR-FY25-10Oct-31-Found means fixed regional webinar APAC 8032 / 460029","cDLProgramName":"460029","source":"Owned Event: Webinar","formFields":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"bY1toaC1jk9iKFTsHBwFd","type":"Entry","createdAt":"2023-09-12T16:44:56.720Z","updatedAt":"2024-10-03T13:13:47.754Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":28,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"sFDCLastCampaignStatus","htmlName":"sFDCLastCampaignStatus","type":"hidden","required":false,"defaultValue":"Registered"}}],"active":true}}}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7yeUl4Q4IPvtvYgSQv8Hx4","type":"Entry","createdAt":"2024-10-25T17:50:32.486Z","updatedAt":"2024-11-26T11:10:28.744Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":36,"revision":17,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{"metaTitle":"Found Means Fixed: AI-Powered Application Security Webinar","metaDescription":"Join our webinar to explore GitHub's \"Found means fixed\" vision for AI-powered application security. Learn how to enhance your DevSecOps workflows, implement best practices, and improve your organization’s security posture.","metaImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4Yo12QyqsFVi21vuHzmDAm","type":"Asset","createdAt":"2024-10-25T17:50:32.280Z","updatedAt":"2024-10-25T17:50:32.280Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"Found means fixed with AI-powered application security Thursday, Nov 21 at 3pm AEDT","description":"Found means fixed with AI-powered application security Thursday, Nov 21 at 3pm AEDT","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/4Yo12QyqsFVi21vuHzmDAm/50c188600790362f618f370ff76b4ba8/Landing_page_header_1200x630__5_.png","details":{"size":982470,"image":{"width":2400,"height":1260}},"fileName":"Landing page header 1200x630 (5).png","contentType":"image/png"}}},"openGraphTitle":"Found Means Fixed: AI-Powered Application Security Webinar","openGraphDescription":"Discover GitHub’s vision for AI-powered security and learn how to enhance your application security practices. Sign up for the webinar!"}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1W2ZAgfSK2jhEsyHPYV3ic","type":"Entry","createdAt":"2024-01-11T21:00:29.315Z","updatedAt":"2024-11-26T10:53:50.537Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":170,"revision":86,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"ai","label":"AI"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}}],"settings":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3MJQpnOGiMYyLoqLOPC8WO","type":"Entry","createdAt":"2024-10-25T17:50:32.506Z","updatedAt":"2024-11-01T18:24:04.436Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"Page Settings for /webcasts/found-means-fixed-with-ai-powered-application-security-apac","hasMinimalFooter":false,"isHidden":false,"revenuePlay":"Security"}}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1ymXswDwzfKwpzSHrsLWiT","type":"Entry","createdAt":"2024-10-25T17:44:58.984Z","updatedAt":"2024-10-25T17:50:46.511Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/webcasts/found-means-fixed-with-ai-powered-application-security-emea","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"43Er1cU3ZSgjH0mpjfxevu","type":"Entry","createdAt":"2024-10-25T17:44:59.074Z","updatedAt":"2024-11-26T11:05:54.893Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":47,"revision":21,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"Resource Page for /webcasts/found-means-fixed-with-ai-powered-application-security-emea","title":"Found means fixed with AI-powered application security - Europe, Middle East and Africa","description":"At GitHub, we believe application security tooling must go beyond alerting—it should also help you fast-track remediation. Enter “Found means fixed,” our vision for AI-powered security. Identifying vulnerabilities is the first step; effectively fixing them is how you’ll make a significant impact.","body":"In this webinar: \n\n- Learn the latest enhancements to code scanning and secret scanning to empower your DevSecOps teams with seamless workflows that integrate detection and remediation in real time.\n- Discover real-world examples, best practices, and insights into how organizations can embed this mindset and practice into their development culture. \n- Understand why adopting the “Found means fixed” philosophy enhances your security posture, fosters collaboration between development and security teams, and ultimately helps protect your organization from potential breaches.\n\nSign up to learn how together we can transform your approach to security.\n","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3LQzaA22uGgyAEjpkBiTPY","type":"Entry","createdAt":"2024-10-25T17:44:59.106Z","updatedAt":"2024-11-12T18:19:40.760Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"event"}},"locale":"en-US"},"fields":{"startTime":"2024-11-21T00:00-04:00","endTime":"2024-11-22T00:00-04:00","speakers":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7eb45r6LocL1humz4hpBkg","type":"Entry","createdAt":"2023-09-05T13:54:16.388Z","updatedAt":"2024-11-26T11:53:19.625Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":60,"revision":27,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Mathew Payne","avatar":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1dkwTPpqhHhDQP3ngx9Q0G","type":"Asset","createdAt":"2023-09-05T13:53:56.196Z","updatedAt":"2023-09-05T13:53:56.196Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Mathew Payne","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/1dkwTPpqhHhDQP3ngx9Q0G/41ae63af11724fb2deb377127c0516a1/Screenshot_2023-09-05_at_10.14.06.png","details":{"size":141960,"image":{"width":245,"height":249}},"fileName":"Screenshot 2023-09-05 at 10.14.06.png","contentType":"image/png"}}},"title":"Principal Field Security Specialist","company":"GitHub"}}],"eventType":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4q6Ypgv15uNorbHXenDRYR","type":"Entry","createdAt":"2024-09-17T20:42:02.901Z","updatedAt":"2024-09-17T20:42:02.901Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":2,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"eventType"}},"locale":"en-US"},"fields":{"title":"Event type: webinar","text":"webinar"}}}},"gated":false,"sfCampaignID":"7015c000001ioayAAA","campaign":"2025q2-wbr-EMEA-Found-Means-Fixed-GHSC","contentForm":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5j43KEziEl7ouP9IembYNq","type":"Entry","createdAt":"2023-08-29T15:03:55.525Z","updatedAt":"2024-11-26T11:30:26.413Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":55,"revision":26,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"form"}},"locale":"en-US"},"fields":{"name":"form-webcast-signup \"Register now\"","title":"Register now","subtitle":" ","eloquaFormName":"Webinar_TemplateForm","formCTA":"Register","formElements":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1oc1nNacqE77XQSuJXaNdl","type":"Entry","createdAt":"2022-03-12T20:17:06.911Z","updatedAt":"2024-11-26T11:37:42.078Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":281,"revision":138,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Work Email Address","htmlName":"emailAddress","type":"email","placeholder":"you@example.com","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6FMPEpNvfZnVg5o5pNdmAz","type":"Entry","createdAt":"2023-04-04T12:27:23.053Z","updatedAt":"2024-11-26T11:37:14.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":373,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"First name","htmlName":"firstName","type":"text","placeholder":"First name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Euizanl72D7hjUPBu1cz4","type":"Entry","createdAt":"2023-04-04T12:27:44.815Z","updatedAt":"2024-11-26T11:37:30.225Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":372,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Last name","htmlName":"lastName","type":"text","placeholder":"Last name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"40sP3SIDeLJIKo7gAvmAdv","type":"Entry","createdAt":"2022-03-12T20:30:16.766Z","updatedAt":"2024-11-26T11:37:50.340Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":264,"revision":130,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Job Title","htmlName":"title","type":"text","placeholder":"Job Title","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5HOQnFx9120Wj4hlsjXaJn","type":"Entry","createdAt":"2022-03-12T20:19:03.843Z","updatedAt":"2024-11-26T11:37:58.388Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":374,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Company","htmlName":"company","type":"text","placeholder":"Acme, Inc","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5zNCZ4hVsez1AWpp6Fga7h","type":"Entry","createdAt":"2022-03-12T20:23:32.191Z","updatedAt":"2024-11-20T14:58:44.487Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCustomerGUID","type":"hidden","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7a3HDjJcLkWmsPKHATLvna","type":"Entry","createdAt":"2022-03-12T20:24:00.556Z","updatedAt":"2024-11-20T14:58:44.527Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":18,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCookieWrite","type":"hidden","required":false,"defaultValue":"0"}}]}},"headerImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1hpoegjYYoUcazuzFesvok","type":"Asset","createdAt":"2024-10-25T17:44:58.947Z","updatedAt":"2024-10-25T17:44:58.947Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Found means fixed with AI-powered application security Thursday, Nov 21 at 5pm CET","description":"Found means fixed with AI-powered application security Thursday, Nov 21 at 5pm CET","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/1hpoegjYYoUcazuzFesvok/172185e12fdb2e262e6fc07ac5006c45/Landing_page_header_1200x630__4_.png","details":{"size":982402,"image":{"width":2400,"height":1260}},"fileName":"Landing page header 1200x630 (4).png","contentType":"image/png"}}},"headerCTA":"Register","buttonCTA":"Register","publicationDate":"2024-10-25T00:00","renderedDate":"Thursday, Nov 21 at 5pm CET","hidden":false,"rendersRichText":false,"marketoCampaign":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7p5RZ5X3m2NUcEVOkSoEQZ","type":"Entry","createdAt":"2024-10-31T19:18:58.235Z","updatedAt":"2024-10-31T19:18:58.235Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"marketoCampaign"}},"locale":"en-US"},"fields":{"title":"CO-GHS-WBNR-FY25-10Oct-31-Found means fixed regional webinar EMEA 8032 / 460031","cDLProgramName":"460031","source":"Owned Event: Webinar","formFields":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"bY1toaC1jk9iKFTsHBwFd","type":"Entry","createdAt":"2023-09-12T16:44:56.720Z","updatedAt":"2024-10-03T13:13:47.754Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":28,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"sFDCLastCampaignStatus","htmlName":"sFDCLastCampaignStatus","type":"hidden","required":false,"defaultValue":"Registered"}}],"active":true}}}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"48hxZyhd5FFN3XDaxVu4QQ","type":"Entry","createdAt":"2024-10-25T17:44:59.134Z","updatedAt":"2024-11-26T11:10:20.568Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":35,"revision":17,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{"metaTitle":"Found Means Fixed: AI-Powered Application Security Webinar","metaDescription":"Join our webinar to explore GitHub's \"Found means fixed\" vision for AI-powered application security. Learn how to enhance your DevSecOps workflows, implement best practices, and improve your organization’s security posture.","metaImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1hpoegjYYoUcazuzFesvok","type":"Asset","createdAt":"2024-10-25T17:44:58.947Z","updatedAt":"2024-10-25T17:44:58.947Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Found means fixed with AI-powered application security Thursday, Nov 21 at 5pm CET","description":"Found means fixed with AI-powered application security Thursday, Nov 21 at 5pm CET","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/1hpoegjYYoUcazuzFesvok/172185e12fdb2e262e6fc07ac5006c45/Landing_page_header_1200x630__4_.png","details":{"size":982402,"image":{"width":2400,"height":1260}},"fileName":"Landing page header 1200x630 (4).png","contentType":"image/png"}}},"openGraphTitle":"Found Means Fixed: AI-Powered Application Security Webinar","openGraphDescription":"Discover GitHub’s vision for AI-powered security and learn how to enhance your application security practices. Sign up for the webinar!"}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1W2ZAgfSK2jhEsyHPYV3ic","type":"Entry","createdAt":"2024-01-11T21:00:29.315Z","updatedAt":"2024-11-26T10:53:50.537Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":170,"revision":86,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"ai","label":"AI"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}}],"settings":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"12nJLZlsaBZIYsY0i2zgHP","type":"Entry","createdAt":"2024-10-25T17:44:59.150Z","updatedAt":"2024-11-01T18:24:16.875Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"Page Settings for /webcasts/found-means-fixed-with-ai-powered-application-security-emea","hasMinimalFooter":false,"isHidden":false,"revenuePlay":"Security"}}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3JdDyVuvmpTOTIv4RjHNWn","type":"Entry","createdAt":"2023-08-24T13:17:16.425Z","updatedAt":"2024-02-21T16:26:37.013Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/webcasts/github-at-black-hat","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5yqki9fu69QXY5e7r146BO","type":"Entry","createdAt":"2022-08-23T16:51:27.633Z","updatedAt":"2024-10-03T12:48:25.093Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":124,"revision":31,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"Resource Page for /webcasts/github-at-black-hat","path":"/webcasts/github-at-black-hat","title":"Meet GitHub Advanced Security","description":"We recently participated in Black Hat USA, a cybersecurity conference in Las Vegas, where we shared our developer-empowering solutions that can help organizations secure their code in minutes.\n\nSign up below to watch the session","body":"\n# Meet GitHub Advanced Security\n\nGitHub Advanced Security (GHAS) helps teams secure their software supply chain and proprietary code with the only community-driven, native application security testing solution.\n\nGHAS offers targeted security context directly in the GitHub developer workflow so developers can [fix vulnerabilities in minutes, not months](https://resources.github.com/contact/security/)—enabling teams to innovate quickly with peace of mind.","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7DZJkLUvPG6FV4oaC9GICS","type":"Entry","createdAt":"2022-08-23T16:54:34.330Z","updatedAt":"2022-08-25T18:48:47.899Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"video"}},"locale":"en-US"},"fields":{"dateRecorded":"2022-08-23T00:00-06:00","speakers":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6Qae8YgU8sUqjvNVmsOSje","type":"Entry","createdAt":"2022-03-22T20:38:01.367Z","updatedAt":"2024-10-09T19:00:49.064Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":45,"revision":20,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Dave Burnison","avatar":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4dGGtDGCaAmrzJJWEfGhqd","type":"Asset","createdAt":"2022-03-22T20:40:23.953Z","updatedAt":"2022-03-22T20:40:23.953Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":1,"locale":"en-US"},"fields":{"title":"assets/img/avatars/dave-burnison.jpg","description":"Dave Burnison\n","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/4dGGtDGCaAmrzJJWEfGhqd/5d7a016e84b945bf77741bc202f39804/dave-burnison.jpg","details":{"size":320897,"image":{"width":1198,"height":1140}},"fileName":"dave-burnison.jpg","contentType":"image/jpeg"}}},"title":"Technical Advocate","company":"GitHub"}}],"isWebcast":false}},"gated":true,"gatedContent":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5zXsPkD9aqc5scgnIWOGxd","type":"Entry","createdAt":"2022-08-25T18:49:56.249Z","updatedAt":"2024-10-03T13:11:34.005Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":28,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"gatedContent"}},"locale":"en-US"},"fields":{"path":"/webcasts/github-at-black-hat","description":"We recently participated in Black Hat USA, a cybersecurity conference in Las Vegas, where we shared our developer-empowering solutions that can help organizations secure their code in minutes.","body":"\u003cdiv class=\"embed-responsive embed-responsive-16by9\"\u003e\u003ciframe src=\"https://player.vimeo.com/video/743509812?h=d3c2862b9d\u0026title=0\u0026byline=0\u0026portrait=0\u0026speed=0\u0026badge=0\u0026autopause=0\u0026player_id=0\u0026app_id=58479/embed\" allow=\"autoplay; fullscreen; picture-in-picture\" allowfullscreen frameborder=\"0\"\u003e\u003c/iframe\u003e\u003c/div\u003e\n\n# Meet GitHub Advanced Security\n\nGitHub Advanced Security (GHAS) helps teams secure their software supply chain and proprietary code with the only community-driven, native application security testing solution.\n\nGHAS offers targeted security context directly in the GitHub developer workflow so developers can [fix vulnerabilities in minutes, not months](https://resources.github.com/contact/security/)—enabling teams to innovate quickly with peace of mind.\n\nIn this session we discussed our developer-empowering security solutions at Black Hat.","lang":"en"}},"sfCampaignID":"7015c000001SM50AAG","campaign":"2023q1-BH22-Webinar-Landing-page","contentForm":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2h0p98dZi8OlxOyXNA1nGU","type":"Entry","createdAt":"2022-08-25T19:01:44.094Z","updatedAt":"2024-11-26T11:30:09.749Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":128,"revision":56,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"form"}},"locale":"en-US"},"fields":{"name":"Gated video page generic form","title":"Sign up to watch","subtitle":"Tell us a bit about you","eloquaFormName":"ContentReg_TemplateForm","formCTA":"Watch the session","formElements":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6FMPEpNvfZnVg5o5pNdmAz","type":"Entry","createdAt":"2023-04-04T12:27:23.053Z","updatedAt":"2024-11-26T11:37:14.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":373,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"First name","htmlName":"firstName","type":"text","placeholder":"First name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Euizanl72D7hjUPBu1cz4","type":"Entry","createdAt":"2023-04-04T12:27:44.815Z","updatedAt":"2024-11-26T11:37:30.225Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":372,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Last name","htmlName":"lastName","type":"text","placeholder":"Last name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1oc1nNacqE77XQSuJXaNdl","type":"Entry","createdAt":"2022-03-12T20:17:06.911Z","updatedAt":"2024-11-26T11:37:42.078Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":281,"revision":138,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Work Email Address","htmlName":"emailAddress","type":"email","placeholder":"you@example.com","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5HOQnFx9120Wj4hlsjXaJn","type":"Entry","createdAt":"2022-03-12T20:19:03.843Z","updatedAt":"2024-11-26T11:37:58.388Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":374,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Company","htmlName":"company","type":"text","placeholder":"Acme, Inc","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"40sP3SIDeLJIKo7gAvmAdv","type":"Entry","createdAt":"2022-03-12T20:30:16.766Z","updatedAt":"2024-11-26T11:37:50.340Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":264,"revision":130,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Job Title","htmlName":"title","type":"text","placeholder":"Job Title","required":true}}]}},"headerImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6zwk8uklFCQ2qeCWfCFiug","type":"Asset","createdAt":"2022-11-22T21:11:38.392Z","updatedAt":"2024-03-19T11:06:41.098Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":14,"revision":4,"locale":"en-US"},"fields":{"title":"Security - Dark 3","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/6zwk8uklFCQ2qeCWfCFiug/a629a56786b371a3a95a222f7058b727/Security-DarkMode-3_1.png","details":{"size":94954,"image":{"width":1200,"height":630}},"fileName":"Security-DarkMode-3 1.png","contentType":"image/png"}}},"headerCTA":"Watch Video","buttonCTA":"Watch Video","publicationDate":"2022-08-10T00:00+00:00","renderedDate":"August 2022","hidden":false,"rendersRichText":false}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"e6kkATty8WptKxPLcrkaI","type":"Entry","createdAt":"2022-08-25T02:21:46.010Z","updatedAt":"2022-11-30T17:25:08.090Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5R9zfL5sHOvIqOX4WnG1mJ","type":"Entry","createdAt":"2024-01-11T21:00:30.758Z","updatedAt":"2024-11-26T10:53:17.315Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":85,"revision":44,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"github-advanced-security","label":"GitHub Advanced Security"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7MRmdpBwKIGrnFZkJ9TFqi","type":"Entry","createdAt":"2024-04-03T20:00:41.146Z","updatedAt":"2024-04-03T20:00:41.146Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/webcasts/github-roadmap-webinar-q2-gated","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3H8TeDCNEN0jJhi6DvWN0b","type":"Entry","createdAt":"2024-04-03T20:00:41.262Z","updatedAt":"2024-10-03T12:33:55.239Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":17,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"Resource Page for /webcasts/github-roadmap-webinar-q2-gated","title":"GitHub Roadmap Webinar, Q2","description":"Where’s GitHub headed next? Join us for our Roadmap Webinar to find out. \n","body":"In our webinar, we'll dive into impactful platform advancements, covering: \n- Scalability: How we’re making it easier for you to streamline processes, and manage your GitHub environment to accommodate your expanding projects and teams \n- AI: How we’re leveraging GitHub Copilot to boost productivity and unlock a better developer experience. \n- Security: Enhancements to security tools that will help foster higher remediation rates, and improve collaboration between developers and security teams. \n\nYou’ll leave with an understanding of what’s in the pipeline for GitHub — and how these changes will benefit you and your team. Register today and get ready for the latest insights into our platform's exciting trajectory.\n","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1bKR3T7EaqaAwlnpBCUiVF","type":"Entry","createdAt":"2024-04-03T20:00:33.472Z","updatedAt":"2024-04-03T20:00:33.472Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":3,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"video"}},"locale":"en-US"},"fields":{"speakers":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4AVa7Y5GYKOB55M4PvSoq8","type":"Entry","createdAt":"2023-08-29T15:03:55.456Z","updatedAt":"2024-11-26T10:52:28.544Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":64,"revision":30,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Walker Chabbott","avatar":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"22qLdD9yH6fmMUOYFw7xD5","type":"Asset","createdAt":"2024-03-06T09:45:40.810Z","updatedAt":"2024-03-06T09:45:40.810Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Speaker picture","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/22qLdD9yH6fmMUOYFw7xD5/131e02e85b7d9f9fb023b10a80e018f8/Screenshot_2023-04-13_at_12.23.27_PM.png","details":{"size":857027,"image":{"width":756,"height":724}},"fileName":"Screenshot 2023-04-13 at 12.23.27 PM.png","contentType":"image/png"}}},"title":"Sr. Product Marketing Manager","company":"GitHub"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1qkBXdtCIFRb44aOyCNYDb","type":"Entry","createdAt":"2023-09-22T22:35:08.755Z","updatedAt":"2024-11-26T10:48:09.920Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":100,"revision":48,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Nicholas Liffen","avatar":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"lGT4vwbEHGrEwL3zQIV2c","type":"Asset","createdAt":"2023-09-22T22:35:07.970Z","updatedAt":"2024-03-11T21:05:06.581Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":8,"revision":2,"locale":"en-US"},"fields":{"title":"Nicholas Liffen avatar","description":"Nicholas Liffen avatar","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/lGT4vwbEHGrEwL3zQIV2c/50e0f8c6862c29566c6fb8dec30b3d42/Nicholas_Liffen_GitHub.jpeg","details":{"size":84243,"image":{"width":800,"height":800}},"fileName":"Nicholas Liffen GitHub.jpeg","contentType":"image/jpeg"}}},"title":"Director, GitHub Advanced Security","company":"GitHub"}}],"isWebcast":false}},"gated":true,"gatedContent":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2nTq51A0VdVIWlvkwLezHd","type":"Entry","createdAt":"2024-04-03T20:00:41.322Z","updatedAt":"2024-10-03T12:57:14.979Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":18,"revision":6,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"gatedContent"}},"locale":"en-US"},"fields":{"path":"/webcasts/github-roadmap-webinar-q2-gated","description":"Where’s GitHub headed next? Join us for our Roadmap Webinar to find out. ","body":"\u003cdiv class=\"embed-responsive embed-responsive-16by9\"\u003e\n \u003ciframe src=\"https://www.youtube.com/embed/Cjn_Beo5_hY\" width=\"640\" height=\"375\" frameborder=\"0\" allowfullscreen\u003e\u003c/iframe\u003e\n\u003c/div\u003e\n\nIn our webinar, we'll dive into impactful platform advancements, covering: \n- Scalability: How we’re making it easier for you to streamline processes, and manage your GitHub environment to accommodate your expanding projects and teams \n- AI: How we’re leveraging GitHub Copilot to boost productivity and unlock a better developer experience. \n- Security: Enhancements to security tools that will help foster higher remediation rates, and improve collaboration between developers and security teams. \n\nYou’ll leave with an understanding of what’s in the pipeline for GitHub — and how these changes will benefit you and your team. Register today and get ready for the latest insights into our platform's exciting trajectory.\n","lang":"en"}},"contentForm":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2h0p98dZi8OlxOyXNA1nGU","type":"Entry","createdAt":"2022-08-25T19:01:44.094Z","updatedAt":"2024-11-26T11:30:09.749Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":128,"revision":56,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"form"}},"locale":"en-US"},"fields":{"name":"Gated video page generic form","title":"Sign up to watch","subtitle":"Tell us a bit about you","eloquaFormName":"ContentReg_TemplateForm","formCTA":"Watch the session","formElements":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6FMPEpNvfZnVg5o5pNdmAz","type":"Entry","createdAt":"2023-04-04T12:27:23.053Z","updatedAt":"2024-11-26T11:37:14.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":373,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"First name","htmlName":"firstName","type":"text","placeholder":"First name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Euizanl72D7hjUPBu1cz4","type":"Entry","createdAt":"2023-04-04T12:27:44.815Z","updatedAt":"2024-11-26T11:37:30.225Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":372,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Last name","htmlName":"lastName","type":"text","placeholder":"Last name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1oc1nNacqE77XQSuJXaNdl","type":"Entry","createdAt":"2022-03-12T20:17:06.911Z","updatedAt":"2024-11-26T11:37:42.078Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":281,"revision":138,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Work Email Address","htmlName":"emailAddress","type":"email","placeholder":"you@example.com","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5HOQnFx9120Wj4hlsjXaJn","type":"Entry","createdAt":"2022-03-12T20:19:03.843Z","updatedAt":"2024-11-26T11:37:58.388Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":374,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Company","htmlName":"company","type":"text","placeholder":"Acme, Inc","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"40sP3SIDeLJIKo7gAvmAdv","type":"Entry","createdAt":"2022-03-12T20:30:16.766Z","updatedAt":"2024-11-26T11:37:50.340Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":264,"revision":130,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Job Title","htmlName":"title","type":"text","placeholder":"Job Title","required":true}}]}},"headerImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2D5ge3LyZ9XKcThUCHn0Tq","type":"Asset","createdAt":"2024-03-07T18:32:24.953Z","updatedAt":"2024-03-13T16:51:28.186Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":17,"revision":5,"locale":"en-US"},"fields":{"title":"GitHub Roadmap Webinar, Q2","description":"Purple shapes around the text GitHub Roadmap Webinar QA April 3, 2024 11:00 AM PST and the speaker Walker Chabbott","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/2D5ge3LyZ9XKcThUCHn0Tq/5bd898e3ab0f68b46f695d46eb56ab6a/1200x630.png","details":{"size":231215,"image":{"width":1201,"height":630}},"fileName":"1200x630.png","contentType":"image/png"}}},"headerCTA":"Watch Video","buttonCTA":"Watch Video","publicationDate":"2024-04-03T00:00","renderedDate":"On-demand","hidden":false,"rendersRichText":false,"marketoCampaign":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4KrxlJnmfv2HVhz4B5Ej1j","type":"Entry","createdAt":"2024-03-13T23:58:13.256Z","updatedAt":"2024-06-20T02:01:46.648Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"marketoCampaign"}},"locale":"en-US"},"fields":{"title":"CDL for /webcasts/github-roadmap-webinar-q2/431528","cDLProgramName":"431528","source":"Owned Event: Webinar","formFields":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"bY1toaC1jk9iKFTsHBwFd","type":"Entry","createdAt":"2023-09-12T16:44:56.720Z","updatedAt":"2024-10-03T13:13:47.754Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":28,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"sFDCLastCampaignStatus","htmlName":"sFDCLastCampaignStatus","type":"hidden","required":false,"defaultValue":"Registered"}}],"active":true}}}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1W2ZAgfSK2jhEsyHPYV3ic","type":"Entry","createdAt":"2024-01-11T21:00:29.315Z","updatedAt":"2024-11-26T10:53:50.537Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":170,"revision":86,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"ai","label":"AI"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6oCTuwcd5YhXB1vPzWNG7c","type":"Entry","createdAt":"2024-01-11T21:00:23.772Z","updatedAt":"2024-10-09T18:28:00.193Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":28,"revision":15,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"enterprise","label":"Enterprise"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}}]}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"50Gk9Ogt6m5EBY55NNXxuu","type":"Entry","createdAt":"2024-03-07T20:03:03.090Z","updatedAt":"2024-03-11T15:55:16.532Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":9,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/webcasts/github-roadmap-webinar-q3","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"Ya0AAQc2YtNrBEiUQfIop","type":"Entry","createdAt":"2024-03-07T20:03:03.184Z","updatedAt":"2024-10-03T12:24:24.021Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":75,"revision":19,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"Resource Page for /webcasts/github-roadmap-webinar-q3","title":"GitHub Roadmap Webinar, Q3","description":"Curious about GitHub's 2024 Q3 releases? Watch to learn more.","body":"\u003cdiv class=\"embed-responsive embed-responsive-16by9\"\u003e\n \u003ciframe src=\"https://www.youtube.com/embed/QyGwvU2F0Fs\" width=\"640\" height=\"375\" frameborder=\"0\" allowfullscreen\u003e\u003c/iframe\u003e\n\u003c/div\u003e\n\nIn this session:\n\n- See improvements coming to GitHub Copilot, like enhanced chat and better integration into your workflow.\n- Learn how you can improve remediation rates and reduce technical debt with our newly integrated AI and security solutions.\n- Preview features aimed to optimize operational efficiency, streamline project execution, and team collaboration.\n\nYou’ll walk away from the session with an understanding of what’s in the pipeline for GitHub — and how these new releases can help you and your organization do your best work.\n","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1KLvH37dmIUfrn4bqx8s1K","type":"Entry","createdAt":"2024-08-09T15:30:40.337Z","updatedAt":"2024-08-09T15:30:40.337Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"video"}},"locale":"en-US"},"fields":{"dateRecorded":"2024-08-07T00:00-04:00","speakers":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4AVa7Y5GYKOB55M4PvSoq8","type":"Entry","createdAt":"2023-08-29T15:03:55.456Z","updatedAt":"2024-11-26T10:52:28.544Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":64,"revision":30,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Walker Chabbott","avatar":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"22qLdD9yH6fmMUOYFw7xD5","type":"Asset","createdAt":"2024-03-06T09:45:40.810Z","updatedAt":"2024-03-06T09:45:40.810Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Speaker picture","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/22qLdD9yH6fmMUOYFw7xD5/131e02e85b7d9f9fb023b10a80e018f8/Screenshot_2023-04-13_at_12.23.27_PM.png","details":{"size":857027,"image":{"width":756,"height":724}},"fileName":"Screenshot 2023-04-13 at 12.23.27 PM.png","contentType":"image/png"}}},"title":"Sr. Product Marketing Manager","company":"GitHub"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6dt0DuRz27SA3OPT0hOYoU","type":"Entry","createdAt":"2023-01-20T08:56:48.011Z","updatedAt":"2024-10-09T18:57:15.712Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":60,"revision":26,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Maya Ross","avatar":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5PMA67MbkmCP1feKLieVlb","type":"Asset","createdAt":"2023-03-20T17:15:27.112Z","updatedAt":"2023-03-20T17:15:27.112Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":5,"revision":1,"locale":"en-US"},"fields":{"title":"Maya Ross","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/5PMA67MbkmCP1feKLieVlb/4c88d7328b8b8238c64313b8c7543ad5/image1.png","details":{"size":370926,"image":{"width":512,"height":512}},"fileName":"image1.png","contentType":"image/png"}}},"title":"VP, Product Management","company":"GitHub"}}],"isWebcast":true}},"gated":false,"contentForm":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3qHQ6eSp20iGQrFIfaBJnn","type":"Entry","createdAt":"2022-09-29T19:33:25.277Z","updatedAt":"2024-11-26T11:30:01.409Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":248,"revision":113,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"form"}},"locale":"en-US"},"fields":{"name":"Form_Ungated_Contact","title":"Wondering how GitHub can help your business?","subtitle":"Tell us more about your needs","eloquaFormName":"ContactUs_TemplateForm","formCTA":"Contact GitHub","formElements":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Euizanl72D7hjUPBu1cz4","type":"Entry","createdAt":"2023-04-04T12:27:44.815Z","updatedAt":"2024-11-26T11:37:30.225Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":372,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Last name","htmlName":"lastName","type":"text","placeholder":"Last name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6FMPEpNvfZnVg5o5pNdmAz","type":"Entry","createdAt":"2023-04-04T12:27:23.053Z","updatedAt":"2024-11-26T11:37:14.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":373,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"First name","htmlName":"firstName","type":"text","placeholder":"First name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6s0zB2lwQZz6ZhWkZQd5r0","type":"Entry","createdAt":"2022-09-29T18:54:51.900Z","updatedAt":"2024-11-26T11:36:43.185Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":234,"revision":112,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Work Email","htmlName":"emailAddress","type":"email","placeholder":"you@company.com","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3IumXBD9IQf1aCt2cTCoVh","type":"Entry","createdAt":"2023-06-23T19:25:51.253Z","updatedAt":"2024-11-26T11:36:56.805Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":212,"revision":105,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Phone","htmlName":"phone1","type":"tel","placeholder":"12 3456 7890","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5HOQnFx9120Wj4hlsjXaJn","type":"Entry","createdAt":"2022-03-12T20:19:03.843Z","updatedAt":"2024-11-26T11:37:58.388Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":374,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Company","htmlName":"company","type":"text","placeholder":"Acme, Inc","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1MS9X9RNVd6BmPN91fMsVg","type":"Entry","createdAt":"2022-09-29T19:31:39.832Z","updatedAt":"2024-11-26T11:37:05.764Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":209,"revision":104,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"What can we help you with?","htmlName":"contactComments","type":"textarea","placeholder":"Tell us how we can help. For support questions, head to github.com/contact ","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5zNCZ4hVsez1AWpp6Fga7h","type":"Entry","createdAt":"2022-03-12T20:23:32.191Z","updatedAt":"2024-11-20T14:58:44.487Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":16,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCustomerGUID","type":"hidden","required":false}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7a3HDjJcLkWmsPKHATLvna","type":"Entry","createdAt":"2022-03-12T20:24:00.556Z","updatedAt":"2024-11-20T14:58:44.527Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":18,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"htmlName":"elqCookieWrite","type":"hidden","required":false,"defaultValue":"0"}}]}},"headerImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2M7bEkJclYD5k452zQuZNB","type":"Asset","createdAt":"2024-03-07T20:03:02.974Z","updatedAt":"2024-07-29T10:51:00.955Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":21,"revision":5,"locale":"en-US"},"fields":{"title":"GitHub Roadmap Webinar - Q3","description":"Purple shapes around the text \"GitHub Roadmap Webinar Q3, 2024\" on August 7, 2024 at 11:00 AM PT and the speakers Walker Chabbott and Maya Ross","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/2M7bEkJclYD5k452zQuZNB/f7d57b394b6b7f6cd75c064f9a65a0b5/352655658-7823c2f9-2165-4542-8497-e9902aabe6a9.webp","details":{"size":178840,"image":{"width":2400,"height":1260}},"fileName":"352655658-7823c2f9-2165-4542-8497-e9902aabe6a9.webp","contentType":"image/webp"}}},"publicationDate":"2024-03-07T00:00","renderedDate":"On-demand","hidden":false,"rendersRichText":false,"marketoCampaign":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"10PgM4BbZFTsBc6Wv5FNIt","type":"Entry","createdAt":"2024-03-14T15:29:39.191Z","updatedAt":"2024-03-14T16:39:52.224Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"marketoCampaign"}},"locale":"en-US"},"fields":{"title":"CO-GHG-WBNR-FY24-03Mar-13-GitHub Roadmap Webinar Q3 - August 7","cDLProgramName":"CO-GHG-WBNR-FY24-03Mar-13-GitHub Roadmap Webinar Q3 - August 7","source":"Owned Event: Webinar","formFields":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"bY1toaC1jk9iKFTsHBwFd","type":"Entry","createdAt":"2023-09-12T16:44:56.720Z","updatedAt":"2024-10-03T13:13:47.754Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":28,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"sFDCLastCampaignStatus","htmlName":"sFDCLastCampaignStatus","type":"hidden","required":false,"defaultValue":"Registered"}}],"active":true}}}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1W2ZAgfSK2jhEsyHPYV3ic","type":"Entry","createdAt":"2024-01-11T21:00:29.315Z","updatedAt":"2024-11-26T10:53:50.537Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":170,"revision":86,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"ai","label":"AI"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3vQGRghKWPkjZOXF1XJQ1h","type":"Entry","createdAt":"2024-01-11T21:00:33.222Z","updatedAt":"2024-10-09T18:27:56.917Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":75,"revision":38,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"developer-productivity","label":"Developer Productivity"}}],"settings":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"stQiBZnqmb99zNzxH23Xx","type":"Entry","createdAt":"2024-03-11T15:25:10.071Z","updatedAt":"2024-03-15T18:44:40.066Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":10,"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"Page Settings for /webcasts/github-roadmap-webinar-q3","hasMinimalFooter":false,"isHidden":false}}}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5QRK6aE5TVAgylPoUnGsbM","type":"Entry","createdAt":"2023-08-29T15:03:55.230Z","updatedAt":"2024-02-21T16:27:22.720Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":12,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"page"}},"locale":"en-US"},"fields":{"path":"/webcasts/securing-your-azure-devops-workflow-with-github-advanced-security","content":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1qqThl0FJf9ROP10o2EXFa","type":"Entry","createdAt":"2023-08-29T15:03:55.353Z","updatedAt":"2024-10-17T17:50:34.788Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":62,"revision":12,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"resourceContainer"}},"locale":"en-US"},"fields":{"internalTitle":"/webcasts/securing-your-azure-devops-workflow-with-github-advanced-securitye","path":"/webcasts/securing-your-azure-devops-workflow-with-github-advanced-security","title":"Securing your Azure DevOps workflow with GitHub Advanced Security","description":"In today's fast-paced development landscape, keeping your code secure shouldn't slow you down. That's why we're thrilled to introduce GitHub Advanced Security on Azure DevOps. ","body":"We’ll dive into how you can leverage GitHub Advanced Security to keep your code, supply chain, and secrets secure before you push to production, all within the Azure DevOps UI you already know and love. Additionally, you’ll learn how this new release can help your team: \n- Proactively identify secrets as early as possible using secret scanning\n- Find and fix vulnerabilities while you write code with code scanning\n- Provide visibility into vulnerable and out-of-date dependencies with supply chain security ","resource":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"37C4d02AbZdvF5D0uyFkIw","type":"Entry","createdAt":"2023-10-09T15:56:11.393Z","updatedAt":"2023-10-09T15:56:11.393Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"video"}},"locale":"en-US"},"fields":{"speakers":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"4AVa7Y5GYKOB55M4PvSoq8","type":"Entry","createdAt":"2023-08-29T15:03:55.456Z","updatedAt":"2024-11-26T10:52:28.544Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":64,"revision":30,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Walker Chabbott","avatar":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"22qLdD9yH6fmMUOYFw7xD5","type":"Asset","createdAt":"2024-03-06T09:45:40.810Z","updatedAt":"2024-03-06T09:45:40.810Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Speaker picture","description":"","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/22qLdD9yH6fmMUOYFw7xD5/131e02e85b7d9f9fb023b10a80e018f8/Screenshot_2023-04-13_at_12.23.27_PM.png","details":{"size":857027,"image":{"width":756,"height":724}},"fileName":"Screenshot 2023-04-13 at 12.23.27 PM.png","contentType":"image/png"}}},"title":"Sr. Product Marketing Manager","company":"GitHub"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"pqo7Gbs8BDf5whhDiqHEm","type":"Entry","createdAt":"2023-08-29T15:03:55.488Z","updatedAt":"2024-10-09T18:57:13.119Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":35,"revision":15,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"person"}},"locale":"en-US"},"fields":{"name":"Bryan Sullivan","avatar":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6j03rGCSAQPFnlh9R3jNAq","type":"Asset","createdAt":"2023-08-29T15:03:55.207Z","updatedAt":"2023-08-29T15:03:55.207Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":4,"revision":1,"locale":"en-US"},"fields":{"title":"Bryan Sullivan avatar","description":"Bryan Sullivan avatar","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/6j03rGCSAQPFnlh9R3jNAq/cc0c351a4e89d63ea4b65a8378e826f3/6990285.jpg","details":{"size":22734,"image":{"width":460,"height":460}},"fileName":"6990285.jpg","contentType":"image/jpeg"}}},"title":"Principal Product Manager","company":"Microsoft"}}],"isWebcast":false}},"gated":true,"gatedContent":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3tqnxFDXPQ5bR3wQlCsjwo","type":"Entry","createdAt":"2023-10-09T15:56:11.438Z","updatedAt":"2024-10-03T13:11:08.416Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":25,"revision":8,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"gatedContent"}},"locale":"en-US"},"fields":{"path":"/webcasts/securing-your-azure-devops-workflow-with-github-advanced-security Gated content","description":"In today's fast-paced development landscape, keeping your code secure shouldn't slow you down. That's why we're thrilled to introduce GitHub Advanced Security on Azure DevOps. ","body":"\u003cdiv class=\"embed-responsive embed-responsive-16by9\"\u003e\n \u003ciframe src=\"https://www.youtube.com/embed/cTkUhKkMD_c\" width=\"640\" height=\"375\" frameborder=\"0\" allowfullscreen\u003e\u003c/iframe\u003e\n\u003c/div\u003e\n\nWe’ll dive into how you can leverage GitHub Advanced Security to keep your code, supply chain, and secrets secure before you push to production, all within the Azure DevOps UI you already know and love. Additionally, you’ll learn how this new release can help your team: \n- Proactively identify secrets as early as possible using secret scanning\n- Find and fix vulnerabilities while you write code with code scanning\n- Provide visibility into vulnerable and out-of-date dependencies with supply chain security ","lang":"en"}},"sfCampaignID":"7015c000001igQKAAY","campaign":"2024q1-WBR-OnDemand-GHAzDO","contentForm":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2h0p98dZi8OlxOyXNA1nGU","type":"Entry","createdAt":"2022-08-25T19:01:44.094Z","updatedAt":"2024-11-26T11:30:09.749Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":128,"revision":56,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"form"}},"locale":"en-US"},"fields":{"name":"Gated video page generic form","title":"Sign up to watch","subtitle":"Tell us a bit about you","eloquaFormName":"ContentReg_TemplateForm","formCTA":"Watch the session","formElements":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"6FMPEpNvfZnVg5o5pNdmAz","type":"Entry","createdAt":"2023-04-04T12:27:23.053Z","updatedAt":"2024-11-26T11:37:14.334Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":373,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"First name","htmlName":"firstName","type":"text","placeholder":"First name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3Euizanl72D7hjUPBu1cz4","type":"Entry","createdAt":"2023-04-04T12:27:44.815Z","updatedAt":"2024-11-26T11:37:30.225Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":372,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Last name","htmlName":"lastName","type":"text","placeholder":"Last name","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"1oc1nNacqE77XQSuJXaNdl","type":"Entry","createdAt":"2022-03-12T20:17:06.911Z","updatedAt":"2024-11-26T11:37:42.078Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":281,"revision":138,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Work Email Address","htmlName":"emailAddress","type":"email","placeholder":"you@example.com","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5HOQnFx9120Wj4hlsjXaJn","type":"Entry","createdAt":"2022-03-12T20:19:03.843Z","updatedAt":"2024-11-26T11:37:58.388Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":374,"revision":186,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Company","htmlName":"company","type":"text","placeholder":"Acme, Inc","required":true}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"40sP3SIDeLJIKo7gAvmAdv","type":"Entry","createdAt":"2022-03-12T20:30:16.766Z","updatedAt":"2024-11-26T11:37:50.340Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":264,"revision":130,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"Job Title","htmlName":"title","type":"text","placeholder":"Job Title","required":true}}]}},"headerImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"43L6FaIKqL549vmQSHpTYe","type":"Asset","createdAt":"2023-08-29T15:03:55.211Z","updatedAt":"2023-12-14T18:39:19.250Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":23,"revision":4,"locale":"en-US"},"fields":{"title":"Securing your Azure DevOps workflow with GitHub Advanced Security","description":"Securing your Azure DevOps workflow with GitHub Advanced Security","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/43L6FaIKqL549vmQSHpTYe/78a9ac0a73a287bbe7a4772ec9723377/Securing_your_Azure_DevOps_workflow_with_GitHub_Advanced_Security.jpg","details":{"size":106913,"image":{"width":1200,"height":630}},"fileName":"Securing your Azure DevOps workflow with GitHub Advanced Security.jpg","contentType":"image/jpeg"}}},"headerCTA":"Watch Video","buttonCTA":"Watch Video","publicationDate":"2023-09-04T00:00","renderedDate":"On demand","hidden":false,"rendersRichText":false,"marketoCampaign":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"7CUq1jzRUD5DHoP1tQfCRY","type":"Entry","createdAt":"2023-09-19T15:49:57.770Z","updatedAt":"2024-06-20T17:33:38.861Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":15,"revision":6,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"marketoCampaign"}},"locale":"en-US"},"fields":{"title":"CO-GHS-WBNR-FY24-10Oct-04-GHAzDO Webinar/411230","cDLProgramName":"411230","source":"Owned Event: Webinar","formFields":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"bY1toaC1jk9iKFTsHBwFd","type":"Entry","createdAt":"2023-09-12T16:44:56.720Z","updatedAt":"2024-10-03T13:13:47.754Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":28,"revision":10,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"formElement"}},"locale":"en-US"},"fields":{"label":"sFDCLastCampaignStatus","htmlName":"sFDCLastCampaignStatus","type":"hidden","required":false,"defaultValue":"Registered"}}],"active":true}}}},"seo":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5Y0SpcVl7X3Fns2SlAEUtq","type":"Entry","createdAt":"2023-08-29T15:03:55.581Z","updatedAt":"2024-10-03T13:11:10.886Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":7,"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"seo"}},"locale":"en-US"},"fields":{"metaTitle":"Securing your Azure DevOps workflow with GitHub Advanced Security","metaDescription":"In today's fast-paced development landscape, keeping your code secure shouldn't slow you down. That's why we're thrilled to introduce GitHub Advanced Security on Azure DevOps. \n","metaImage":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"43L6FaIKqL549vmQSHpTYe","type":"Asset","createdAt":"2023-08-29T15:03:55.211Z","updatedAt":"2023-12-14T18:39:19.250Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":23,"revision":4,"locale":"en-US"},"fields":{"title":"Securing your Azure DevOps workflow with GitHub Advanced Security","description":"Securing your Azure DevOps workflow with GitHub Advanced Security","file":{"url":"//images.ctfassets.net/wfutmusr1t3h/43L6FaIKqL549vmQSHpTYe/78a9ac0a73a287bbe7a4772ec9723377/Securing_your_Azure_DevOps_workflow_with_GitHub_Advanced_Security.jpg","details":{"size":106913,"image":{"width":1200,"height":630}},"fileName":"Securing your Azure DevOps workflow with GitHub Advanced Security.jpg","contentType":"image/jpeg"}}},"openGraphTitle":"Securing your Azure DevOps workflow with GitHub Advanced Security","openGraphDescription":"In today's fast-paced development landscape, keeping your code secure shouldn't slow you down. That's why we're thrilled to introduce GitHub Advanced Security on Azure DevOps. \n"}},"topics":[{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"3eooBSzENNTxGyphoW95TR","type":"Entry","createdAt":"2024-01-11T21:00:28.899Z","updatedAt":"2024-11-26T10:53:09.203Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":150,"revision":77,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"security","label":"Security"}},{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"5R9zfL5sHOvIqOX4WnG1mJ","type":"Entry","createdAt":"2024-01-11T21:00:30.758Z","updatedAt":"2024-11-26T10:53:17.315Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":85,"revision":44,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"topic"}},"locale":"en-US"},"fields":{"slug":"github-advanced-security","label":"GitHub Advanced Security"}}],"settings":{"metadata":{"tags":[],"concepts":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"wfutmusr1t3h"}},"id":"2jTAbi8FqhPb0TNRSBc0R4","type":"Entry","createdAt":"2023-08-29T15:03:55.600Z","updatedAt":"2024-11-19T16:12:49.356Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"publishedVersion":6,"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"Page Settings for /webcasts/securing-your-azure-devops-workflow-with-github-advanced-security","hasMinimalFooter":false,"isHidden":false,"revenuePlay":"Security"}}}}],"featureFlags":{"featureEnabledNewFormsService":false,"featureEnabledNewAppNavigation":true,"featureEnableSearch":false}},"__N_SSP":true},"page":"/topics/[slug]","query":{"slug":"security"},"buildId":"ZokmF09g2SkORXwoG0TZr","isFallback":false,"isExperimentalCompile":false,"gssp":true,"locale":"en-US","locales":["en-US","ja","pt-BR","es-419","ko-KR"],"defaultLocale":"en-US","scriptLoader":[]}</script><div id="ghcc" style="position:sticky;bottom:0;z-index:99999"></div></body></html>

Pages: 1 2 3 4 5 6 7 8 9 10