Posted on
in Presentations
Transitioning to the cloud has brought new challenges and threats, one specific threat derived from this transition is the leak of credentials. This presentation will provide analytics of leaked credentials online in the most popular code repository. Presenters will provide code and analytics of most leaked secrets by application, service, code, and cloud provider, as well as mitigation strategies.
Cloud Security DevSecOps & Application Security
application security cloud security DevSecOps hackers & threats
Topic
Cloud Security
DevSecOps & Application Security
Subtopic
application security
cloud security
DevSecOps
hackers & threats
Share With Your Community