Product
Solutions
Code Security (SAST, SCA, IaC)
Secure code at peak velocity
Secret Detection & Mitigation
Zero new hardcoded secrets
Software Bill Of Materials (SBOM)
Know your code
Automated Developer Access Management
Dynamic access. Secure code.
Anomalous Developer Behavior
Behavior-based security
Security Reporting & Audit
Always compliant, Always secure.
Application security posture management (ASPM)
Identify and prioritize risks in your product & source code
Integrations
Arnica + GitHub
Arnica + Azure DevOps
Arnica + Bitbucket
Arnica + GitLab
Arnica + Chat
Arnica + Issue Management
Arnica + AI
Benefits
Arnica for Security
Arnica for DevOps
Resources
Announcements
Blog
Press
Docs
Company
About
Careers
Security
Contact
Pricing
Log In
Get Started
Book a Demo
Book a Demo
Get Started
Solutions
Code Security (SAST, SCA, IaC)
Secret Detection & Mitigation
Software Bill Of Materials (SBOM)
Automated Developer Access Management
Anomalous Developer Behavior
Security Reporting & Audit
Application security posture management (ASPM)
Integrations
Arnica + GitHub
Arnica + Azure DevOps
Arnica + Bitbucket
Arnica + GitLab
Arnica + Chat
Arnica + Issue Management
Arnica + AI
Benefits
Arnica for Security
Arnica for DevOps
Resources
Announcements
Blog
Press
Docs
Company
About
Careers
Security
Contact
Pricing
DEVELOPMENT
What Every Developer Needs to Know About GitHub Branch Protection
Nir Valtman
March 13, 2024
ATTACK
Malicious Code Campaign on GitHub Repos: Is it Hype or a Dire Threat?
Nir Valtman
March 5, 2024
Keep up with the latest updates from Arnica
Subscribe to our newsletter for updates
Thank you for subscribing to our newsletter!
We'll continue to plant the Arnica seeds with you.
Our apologies, it seems something went wrong with the subscription submission. Please try again.
Sign-up to our RSS feeds
Announcements
Blog
Press
All Posts
Announcements
Blog
Press
Help
ATTACK
How to ensure you don’t have Sourcegraph secrets in source code
Nir Valtman
September 4, 2023
APPSEC
How to ensure your third-party software packages are reputable
Mark Maney
August 16, 2023
APPSEC
How to prioritize your backlog of hardcoded secrets
Nir Valtman
July 18, 2023
Previous
Next