
ASW #230 - Lina Lau
Application Security Weekly (Audio)
00:00
Is There a Way to Track a Token Using a CI Key?
The trick is to make sure that the security team have detections in place for everything that happens prior to the token stealing. Even if you can't prove it, I think companies should err on the side of caution and still refresh the tokens. The best way to prepare for a tabletop exercise is to have a look at what your current processes are. What playbooks do you have built? Do these align with the new attacks that are occurring in the wild? How aware is your security team of new attacks?"
Transcript
Play full episode