Bad actors are compromising cloud applications and assets with malware and Trojans. After establishing a foothold, they use command and control servers to manipulate cloud applications and other resources to move laterally towards crown jewel data.
Join John Alexander, Orca Security’s Director of Technical Product Marketing, as he reveals the latest research, pressing challenges, and practical solutions surrounding malware in the cloud.
Key Takeaways Include:
• How supply chain attacks have become a stealthy way to spread cloud malware
• Best practices for stopping malware in the cloud
• Orca Security’s latest research on what to look out for including the most common malware file types and where they are probably hiding within your cloud estate
And get ready to ask John your toughest cloud security questions!