Bad at Keeping Secrets? Understanding the Risk of Exposed Access Keys

Presented by

Michael Marriott, Senior Product Marketing Manager and Charles Ragland, Security Engineer

About this talk

There’s a dilemma facing organizations with software development functions. Companies that build software products, must ship them to their users, and quickly. However, all too often, security teams lack visibility as to whether technical assets, such as access keys, are exposed to online software development platforms. In this webinar, attendees will learn about Digital Shadows' most recent research into exposed access keys, as well as the solutions available for security teams to gain this visibility. Attendees will learn about: - Digital Shadows research findings that analyzed 800,000 leaked access keys. - The different types of exposed keys, including database stores, online services, and SSH keys. - How SearchLight detects leaked access keys in real-time.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (233)
Subscribers (6344)
Digital Shadows SearchLight protects organizations against external risk exposure. Organizations register their company names, brand names, domains, and document marketings for monitoring. Through the SearchLight portal, we provide the most relevant and critical digital risks with complete visibility, context, recommended actions, and ways to remediate the risk.