Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Why Your Codebase Needs Proper Security Stages To Prevent Leaks
Cybersecurity Minute

Why Your Codebase Needs Proper Security Stages To Prevent Leaks

Robert WoodBy Robert WoodJanuary 30, 2023Updated:March 20, 20231 Min Read
Facebook Twitter LinkedIn Email
To adjust the volume hover the cursor over the volume bar
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

In episode 41 of the Cybersecurity Minute, Robert Wood discusses secrets that are checked into codebases and why they require proper security.

Which companies are the most important vendors in cybersecurity? Click here to see the Acceleration Economy Top 10 Cybersecurity Shortlist, as selected by our expert team of practitioner analysts.

Highlights

00:17 — Secrets can mean different things to different people. It could refer to passwords, database credentials, connection strings, or API tokens. Whatever form they take, they are meant to be kept a secret.

00:34 — Developers or coders who contribute to the development of the codebase — and its secrets — will be able to see it by design. Additionally, they will be able to see the history of the codebase.

Which companies are the most important vendors in cybersecurity? Check out
the Acceleration Economy Cybersecurity
Top 10 Shortlist
.

00:59 — Robert emphasizes the importance of going back into the codebase after something has been “accidentally committed.” Ensure that you are changing values, updating keys, and changing any potential points of exposure.

01:06 — It is really important that those setting up CI/CD pipelines, and the security around them, have proper security stages integrated into them. Consider a solution that will address any potential leaks into a codebase.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

Cybersecurity Cybersecurity Minute data security software solution
Share. Facebook Twitter LinkedIn Email
Robert Wood

Robert Wood is an Acceleration Economy Analyst focusing on Cybersecurity. He has led the development of multiple cybersecurity programs from the ground up at startups across the healthcare, cyber security, and digital marketing industries. Between experience with startups and application security consulting he has both leadership and hands on experience across technical domains such as the cloud, containers, DevSecOps, quantitative risk assessments, and more. Robert has a deep interest in the soft skills side of cybersecurity leadership, workforce development, communication and budget and strategy alignment. He is currently a Federal Civilian for an Executive Branch Agency and his views are his own, not representing that of the U.S. Government or any agency.

Related Posts

AI Agent & Copilot Podcast: Avanade Exec on Security Data Storage, Integration Advances in Microsoft Sentinel

October 15, 2025

With Agentic AI Infusion, Microsoft Positions Sentinel as Unifying Security Platform

October 3, 2025

ServiceNow Delivers Agents, AI Management Controls, and Autonomous CRM Features

September 30, 2025

Microsoft Knowledge Agent Adds Management, Quality Control to SharePoint Data

September 25, 2025
Add A Comment

Comments are closed.

Recent Posts
  • ‘She Builds’ Theme Takes Center Stage at the Women in Tech Luncheon
  • AWS Outage Puts It Farther Behind Microsoft, Google Cloud, Oracle
  • Day 3 of Community Summit: AI in Action — Driving Accessibility, Efficiency, and Transformation
  • Community Summit NA: Microsoft’s Roadmap for Copilot Studio, Azure AI Foundry Integration
  • IBM and Anthropic Forge Strategic AI Alliance to Accelerate Enterprise Innovation with Claude Integration

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks and Reports

The Agentic Enterprise: How Microsoft and Industry Leaders Are Redefining Work Through AI

September 2, 2025

SAP Business Network: A B2B Trading Partner Platform for Resilient Supply Chains

July 10, 2025

Using Agents and Copilots In M365 Modern Work

March 11, 2025

AI Data Readiness and Modernization: Tech and Organizational Strategies to Optimize Data For AI Use Cases

February 21, 2025

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }