
What the heck are secrets?
01/26/2023
In this episode, Matt defines what secrets are, such as API keys, database passwords, encryption keys, and more. He explains that hackers target them in order to gain access to an application, causing a security breach such as with CircleCI recently.
Keep learning
• Related: Why the CircleCI hack is a red flag
• Special: The State of Supply Chain Security
• Get a free SBOM and supply chain risk analysis
• Related: Why the CircleCI hack is a red flag
• Special: The State of Supply Chain Security
• Get a free SBOM and supply chain risk analysis

Field CISO at ReversingLabs. Matt Rose has an extensive background in application security, object-oriented programming, multi-tier architecture design and implementation, and internet/intranet development. His areas of expertise include Application Security, SAST, DAST, IAST, SCA, DevSecOps, and Threat Modeling. Matt is an accomplished public speaker and has been quoted in 50+ AST industry media publications.