
Managing Data Leaks Outside Your Perimeter
Defense in Depth
Safeguarding Credentials and Secrets in Software Development
The chapter emphasizes the risks of leaking sensitive information like credentials and stresses the importance of proactive measures such as scanning code repositories for leaks. It discusses secure secret management, challenges in securing secrets, providing a good developer experience with security tools, and the concept of shifting security responsibilities to developers.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.