Is This Your Pipe? Hijacking the Build Pipeline

As developers of the web, the presenters rely on tools to automate building code, run tests, and even deploy services. What happens when they're too trusting of CI/CD pipelines? Credentials get exposed, hijacked, and re-purposed.
Provided by: Topic: Security Date Added: Jan 2015 Format: Webcast

Find By Topic