How to make the most out of a mentoring relationship
Tips from our developer advocates on how and why to find a mentor.
Tips from our developer advocates on how and why to find a mentor.
Practical tips on how to apply OWASP Top 10 Proactive Control C4.
A comprehensive guide for vulnerability reporters.
Today, we’re shipping improvements to Dependabot alerts that make them easier to understand and remediate.
The ability to customize the command palette’s keyboard shortcuts is now available to all github.com users in beta. Customize the keyboard shortcuts for opening the command palette in search and…
Since our last update, we have a number of exciting updates to share with you for the new projects experience. Including improvements which shorten the gap between the original projects…
In GitHub’s latest transparency report, we’re giving you a by-the-numbers look at how we responded to requests for user info and content removal.
When it comes to secure database access, there’s more to consider than SQL injections. OWASP Top 10 Proactive Control C3 offers guidance.
When digital infrastructure is overlooked by governments, it isn’t just a missed opportunity: policies may inadvertently endanger open source collaboration.
With the successful liftoff of the James Webb Space Telescope, we ask our very own Arfon Smith about the history of open source and space science.
From answering questions about a new release to fielding feature requests, here’s how five open source communities use GitHub Discussions.
My colleague Stormy Peters and I are proud to represent GitHub at the White House’s Open Source Software Security Summit.
The GitHub Security Lab’s CodeQL bounty program fuels GitHub Advanced Security with queries written by the open source community.
As the year winds down, we’re highlighting some of the incredible work from GitHub’s engineers, product teams, and security researchers.
Instead of allowing all or no users to force push, admins can now be selective about who can force push to a repository. The image below shows how in the…
In this third and last part, I’ll share the results of my research on Apache HTTP server, and I’ll show some of the vulnerabilities that I’ve found.
In this post, I’ll discuss how to apply OWASP Proactive Control C2: Leverage security frameworks and libraries.
When you want to create a workflow in the Actions tab of your repository, the recommendations are now based on an analysis of repo content.
Getting started with GitHub Actions just got easier! Now, when you want to create an Actions workflow in the Actions tab of your repository, the workflow recommendations will be based…
Up until today, the GitHub Advisory Database has only published advisories that have been curated and approved by our Security Lab team. This approach meant users sometimes couldn’t find advisories…
Following our last update, we have a number of exciting updates and improvements being released today for the new projects experience. 🔗 Stay in sync with linked pull requests One…
Build what’s next on GitHub, the place for anyone from anywhere to build anything.
Last chance: Save $700 on your IRL pass to Universe and join us on Oct. 28-29 in San Francisco.