Keeping Secrets – How to make your code more secure

Security vulnerabilities involving connection strings can arise based on the type of authentication used, how connection strings are persisted in memory, and the techniques used to construct them at run time. Find out how to minimise the risk of exposing your secrets via code.