
Episode 134: Preventing Data Breaches: Strategies to Mitigate Initial Compromise
The Cyber Threat Perspective
00:00
Why code repositories are a critical exploitation vector
Spencer warns about leaked secrets in GitHub/GitLab, CI systems, and recommends scanning tools like Trufflehog to detect exposed keys.
Play episode from 35:33
Transcript


