Defense in Depth cover image

Managing Data Leaks Outside Your Perimeter

Defense in Depth

00:00

Safeguarding Credentials and Secrets in Software Development

The chapter emphasizes the risks of leaking sensitive information like credentials and stresses the importance of proactive measures such as scanning code repositories for leaks. It discusses secure secret management, challenges in securing secrets, providing a good developer experience with security tools, and the concept of shifting security responsibilities to developers.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app