Watch this webinar for some of the more common (and complex!) attack scenarios in CI/CD pipelines
Developer Insider

Monday, June 26, 2023

Sponsored by: 

Prisma Cloud
CI/CD Attack Scenarios: How to Protect Your Production Environment

From bypassing branch protection rules, to more complex attack scenarios like Poisoned Pipeline Execution - attackers have found that CI/CD is a quick way to invoke malicious attacks on production environments and gain control.

This talk will walk you through some of the more common (and complex!) attack scenarios in CI/CD pipelines, and what you can do to ensure your delivery pipeline doesn't become the entry point for attackers.

SAVE YOUR SEAT
 

CONNECT WITH TECHREPUBLIC

 

We're on TikTok and Instagram now!

FacebookTwitterInstagramLinkedInTikTokYouTube

Visit the Subscription Center to get other free newsletters, manage your account settings or to be removed from TechRepublic communications.

 

Unsubscribe   | FAQ | Terms of Use | Privacy Policy

© 2022 TechnologyAdvice, LLC. All rights reserved. All rights reserved.

This is a marketing email from TechnologyAdvice, 3343 Perimeter Hill Dr., Suite 100, Nashville, TN 37211, USA. Please do not reply to this message. To contact us, please click here.