Is This Your Pipe? Hijacking the Build Pipeline

Provided by: Topic: Security Date Added: Jan 2015 Format: Webcast
As developers of the web, the presenters rely on tools to automate building code, run tests, and even deploy services. What happens when they're too trusting of CI/CD pipelines? Credentials get exposed, hijacked, and re-purposed.

Find By Topic