Ruby Rogues
Secrets Management Best Practices and Tools - RUBY 655
Brian Vallelunga
So, you know, every time someone has read a secret, written a secret, changed some settings on every device with their IP address, you get a whole picture about everything that's going around or going on around your secrets. And then the other key part is that it's deeply connected to their workflows and their infrastructure.
0
💬
0
Comments
Log in to comment.
There are no comments yet.