Episode 74 — Repository, Application, and Code Security: Secrets Scanning, Input Validation, Secure Cookies, Static Analysis, and Code Signing (4.1)

This episode covers security controls that protect code, applications, and software repositories from preventable weaknesses. Secrets scanning detects exposed API keys, passwords, tokens, certificates, or credentials before they are misused. Input validation checks that submitted data follows expected rules before an application processes it, reducing the risk of injection and malformed requests. Secure cookies use settings that limit exposure, such as restricting access by scripts, requiring secure transmission, or controlling cross-site behavior. Static code analysis reviews source code for flaws before deployment, while code signing helps verify software integrity and publisher identity. For Security+ scenarios, students should connect these controls to secure development, supply chain trust, and application risk reduction. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!
Episode 74 — Repository, Application, and Code Security: Secrets Scanning, Input Validation, Secure Cookies, Static Analysis, and Code Signing (4.1)
Broadcast by