Watch this webinar for some of the more common (and complex!) attack scenarios in CI/CD pipelines
From bypassing branch protection rules, to more complex attack scenarios like Poisoned Pipeline Execution - attackers have found that CI/CD is a quick way to invoke malicious attacks on production environments and gain control. This talk will walk you through some of the more common (and complex!) attack scenarios in CI/CD pipelines, and what you can do to ensure your delivery pipeline doesn't become the entry point for attackers. |
|
|
CONNECT WITH TECHREPUBLIC |
|
|
We're on TikTok and Instagram now! |
|
|
© 2022 TechnologyAdvice, LLC. All rights reserved. All rights reserved. This is a marketing email from TechnologyAdvice, 3343 Perimeter Hill Dr., Suite 100, Nashville, TN 37211, USA. Please do not reply to this message. To contact us, please click here. |
|
|
|