skip to Main Content

Getting Secrets Out of Source Code

Secrets are valuable information targeted by attackers to get access to your system and data. Secrets can be encryption keys, passwords, private keys, AWS secrets, Oauth tokens, JWT tokens, Slack tokens, API secrets, and so on. Unfortunately, secrets are sometimes…

Read More

A Path to Achieving Network Security ZEN

Finding a balance between a pleasant user experience and stringent security requirements can be a challenge. User authentication has become increasingly complex over the years, blending usernames and passwords with second factor authentication, like One Time Passwords (OTP). In many…

Read More

Growing Our Security Champions

Adobe recently held a Security Champions Summit in Bucharest. This was a multi-day event with the goal of building up the skills of our current security champions and encouraging new ones to join the program. Part of the efforts during the…

Read More
Back To Top