Secrets Security End-To-End
At the heart of all of our tools, credentials allow human-to-machine and machine-to-machine communication. According to recent research, 93% of organizations had two or more identity-related breaches in the past year. It is clear that we need to address this growing issue. Unfortunately, many organizations are OK with using plaintext credentials, which we should all know not to do by now. Given the scope of the problem, what can we do? Let's make a plan! - Secrets Detection - Secrets Management - Developer Workflows - Real-time Secrets Scanning - Automatic Rotation By the end of this session, you should have a clear roadmap for taming the machine identity mess in your code and pipelines.
Up Next from PHP Tek 2025
Test Less To Test All: Client-side Philosophy In Testing
Philip Tadeo · Standard (50 minutes)
Design Choices When Implementing Your API
Jack Polifka · Standard (50 minutes)
Systemic PHP typing : best practices
Damien Seguy · Standard (50 minutes)
NativePHP: Past, Present, and Future
Shane Rosenthal · Standard (50 minutes)