Skip to content

Category

Security

Avoiding npm substitution attacks

Avoiding npm substitution attacks

Supply chain attacks are a reality in modern software development. Thankfully, you can reduce the attack surface by taking precautions and being thoughtful about how you manage your dependencies. We…

Isaac Z. Schlueter
Happy anniversary GitHub Security Lab!

Happy anniversary GitHub Security Lab!

Last year at GitHub Universe, we introduced the GitHub Security Lab, which is committed to contributing resources, tooling, bounties, and security research to secure the open source ecosystem. We know…

Jamie Cool
Applying DevSecOps to your software supply chain

Applying DevSecOps to your software supply chain

To best apply DevSecOps principles to improve the security of your supply chain, you should ask your developers to declare your dependencies in code; and in turn provide your developers with maintained ‘golden’ artifacts and automated downstream actions so they can focus on code.

Maya Kaczorowski
Phishing Resistant SMS Autofill

Phishing Resistant SMS Autofill

We recently shipped support for the origin-bound draft standard for security codes delivered via SMS. This standard ensures security codes are entered in a phishing-resistant manner. It accomplishes this by binding an SMS with…

Zhongying Qiao
Lightning Q&A: DevSecOps in five with Maya Kaczorowski

Lightning Q&A: DevSecOps in five with Maya Kaczorowski

In this interview, we dig deeper with Maya Kaczorowski on what DevSecOps is, and how to apply it. It’s a mindset shift in how development teams think about security. DevSecOps is about making all parties who are part of the application development lifecycle accountable for security of the application.

Grace Madlinger
How we threat model

How we threat model

At GitHub, we spend a lot of time thinking about and building secure products—and one key facet of that is threat modeling. This practice involves bringing security and engineering teams…

Robert Reichel