Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How to Protect your Attack Surface? Maduresh Anur, Senior Product Manager | Cortex Xpanse, Palo Alto Networks The biggest threats facing the global attack surface are not making headlines for being the hottest new exploits or brand-new vulnerabilities; they ar... 1 week ago | 15 mins Cloud Security Masterclass: Minimizing the Blast Radius of a Cloud Breach Josh Stella, Chief Architect of Snyk The Twitch breach may have begun with a lone server misconfiguration, but its blast radius reached everything from sensitive customer data to source c... July 14, 2022 7:00pm Cloud Threat Report: IAM the first line of defense Nathaniel Quist, Principal Researcher, Unit 42; Jay Chen, Principal Researcher Unit 42; Brandon Dunlap, Moderator The ongoing transition to cloud platforms has meant that more sensitive data is stored in the cloud, making it more tempting for adversaries to exploi... 4 weeks ago | 57 mins I was never here: Identity discussion with a KPMG Partner & former CSIS officer Marc Chaput (Partner Cyber Security and IAM, KPMG) , Andrew Kirsch (Former CSIS Officer) Former CSIS officer Andrew Kirsch and KPMG Identity Practitioner Marc Chaput discussed Identities, ways to exploit them, and solutions to reduce the t... 1 month ago | 42 mins Cloud Security Masterclass: Locking Down the Security of AWS IAM-Part 1 Josh Stella, Co-Founder and CEO of Fugue If you use Amazon Web Services (AWS), you’re probably making extensive use of the AWS Identity and Access Management (IAM) service. It’s a powerful to... 6 months ago | 51 mins Locking Down the Security of AWS IAM - Part 2 Josh Stella, Fugue Co-Founder and CEO Amazon Web Service’s Identity and Access Management (IAM) service is a powerful tool for managing access to your AWS resources that’s essentially a ne... 5 months ago | 45 mins Locking Down the Security Of IAM Josh Stella, CEO,CTO and Co-Founder, Fugue Cloud identity and access management resources such as AWS IAM are powerful infrastructure tools that are more akin to cloud-based networks. But the c... 7 months ago | 41 mins Locking Down the Security Of IAM Josh Stella, CEO,CTO and Co-Founder, Fugue Cloud identity and access management resources such as AWS IAM are powerful infrastructure tools that are more akin to cloud-based networks. But the c... 9 months ago | 41 mins Cloud Security Masterclass-Building a Highly Secure S3 Bucket Part 2 Josh Stella, Co-Founder and CEO of Fugue Amazon S3 probably gets a lot of use at your company—it’s easy to use, reliable, and scalable. But S3 security isn’t so simple—it’s easy to get wrong ... 1 month ago | 57 mins How to defend your organization against Apache Log4j? Brad Duncan, Threat Intelligence Analyst , Unit 42 Palo Alto Networks On December 9, a remote code execution (RCE) vulnerability in Apache Log4j 2 was identified as being exploited in the wild. Apache Log4j is an open-... 4 months ago | 64 mins Load more