The Cyber Threat Perspective cover image

Episode 134: Preventing Data Breaches: Strategies to Mitigate Initial Compromise

The Cyber Threat Perspective

00:00

Why code repositories are a critical exploitation vector

Spencer warns about leaked secrets in GitHub/GitLab, CI systems, and recommends scanning tools like Trufflehog to detect exposed keys.

Play episode from 35:33
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app