Hi there, I have just integrated ~20 repos with the GitHub integration. I am now trying to separate some of our external facing and internal facing repositories. How can I achieve that?
Bringing new tools in and getting them to be adapted can be a herculean effort. Habits take work to change. We’ve put together a customizable email template that you can send out to your team so they are up to speed with Debricked. InstructionsCopy the template below and paste it into a new email/internal message. If you are using Notion for your internal documentation, you might want to duplicate this page. Customize the [placeholder text]. Add any additional context to help your team understand how and why you’re using Debricked, and remove any content irrelevant to your environment. Send the email/message to your team and prepare to get your open source security on point! Template Hello team,As some of you know, we’re now using Debricked as our Software Composition Analysis tool (SCA). Debricked will scan our repositories for any unwanted vulnerabilities and non-compliant licenses and support us in finding open source projects that fit our internal policies.Why are we using Debricke
Welcome 🤩 First things first, why did we create this community? Our goal is to give you a forum where you feel supported on your Open Source Security journey. Whether you are seeking help with a Debricked feature or you are looking for more in-depth advice on change management for security practices in your team, we want to be your go-to place. Our community is a place built to learn, engage and connect with other developers with different experiences, and skills to help us all move into new spheres of Open Source security knowledge!TL;DR: if you want to learn about Debricked or topics orbiting Open Source Security you are in the right place. If you want to become a DND level 20 this is not your forum. 😉 Touring the community Stuck with a question about Debricked? Check out our Knowledge Base where you will find documentation and guides Not find what you are looking for? Create a post with your question under the category Debricked Q&A (here is how). You can use tags so we can he
Last week we hosted our monthly onboarding session: “Learn the Debricked Fundamentals”. In this webinar we usually go through an overview of the tool and some Q&A from the audience. No FOMO is needed.You can watch it here or share it with your team.You can join live next time 👇
What happens with existing users if I start using enterprise SSO: will they be able to use GitHub SSO or use user and password?
How do you define a contributing developer in your tool?
Join us as we unravel the world of cybersecurity terminology. Are you sometimes lost in the whirlwind of cybersecurity terms? Want to learn more about its fundamentals and how you and your team can stay safe? Look no further! 🛡️ Check out my brand new YouTube playlist filled with informative videos on the basics of cybersecurity. From basic definitions to understanding common threats, these videos have you covered. 🎥 Watch the playlist here: https://www.youtube.com/playlist?list=PLZQ5U-W8XnxMrF2UKpkC03sG2OrEE5bkf Big thanks to @martin.hell for sharing his knowledge with us!
Oh how time flies! The second quarter of the year is already over, and we couldn’t have been more excited to share what we’ve been up to over the last couple of months. We’ve done plenty of interesting things (be sure to check out our LinkedIn page to read up), but the highlight of our year so far has definitely been being named leader in the 2023 Gartner Magic Quadrant for Application Security Testing.Now that we’ve got the mandatory bragging out of the way, let’s jump into learning more about all the latest feature releases that will make your day a little better with Debricked ✨ What have we released in Q2? Overview: License Risk & Vulnerabilities Fixed widgetsCompleting the Overview pageAs part of completing our Overview page, we've added two brand-new widgets: The License Risk widget, displaying your current license compliance risks, grouped by critical, high, medium, low, and unknown risk levels. You can customize the data by selecting the repository/branch. The Vulnerabiliti
Keep in mind that this feature is currently only available for Enterprise customers. This article details how to configure JumpCloud OIDC as the primary Identity Provider to facilitate SSO with Debricked. For details regarding integration with other Identity Providers, see Set up Single Sign On (SSO) for Debricked. Adding a new application Configuring the Debricked app Communicating the data with Debricked Adding users Testing the set up Adding a new applicationIn your JumpCloud Admin Portal, click on SSO under “User Authentication” in the sidebar. From here click on + Add new application at the top of the page Once the applications modal is open, click on Custom OIDC App to start setting up the Debricked integration. Configuring the Debricked appAfter clicking on Custom OIDC App you will be asked to name the new application. We suggest you give it an easily recognizable name, e.g. “Debricked” or “Debricked SSO”.Select the SSO tab and complete the configuration:In the Redirect
Hi, i keep getting an error when setting up rules: “Error generating rule”
You can create an account below using either single sign-on or a username/password. Already have an account? Log in
No account? Create an account now.
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.
Sorry, we're still checking this file's contents to make sure it's safe to download. Please try again in a few minutes.
Sorry, our virus scanner detected that this file isn't safe to download.