Breach, DevOps

Legal recourse? Nissan balances competitive and security fallout from source code leak

January 8, 2021
  • Protect private data areas using authentication, multi-factor-based systems, and IP restrictions.
  • Encrypt data at rest and data in motion.
  • Run regular Google dork queries back against systems just in case something shows up.
  • If something shows up, ask Google to remove it with their search console.
  • Make sure that sensitive data cannot be indexed using a robots.txt file (this will prevent Google, but not every search engine).
prestitial ad