Cloud Attacks Are Here: Threat Actors Like Containers Too!

Logo
Presented by

Anna Belak, Director of Thought Leadership, Sysdig

About this talk

Cloud adoption is the trend of the decade, and threat actors are tailoring their methods to this new attack surface. Cryptojacking is the most prevalent type of cloud attack due to the low risk and high reward for the perpetrator. But even newer technology like containers is being used for evil as attackers plant unpleasant surprises in public repositories, exposing your business to potential supply chain compromise. Join us to learn about what Sysdig's Threat Research Team is seeing out there and what you can do to protect yourself. Anna Belak, Director of Thought Leadership at Sysdig, will discuss: • What types of attacks are popular in the cloud and why? • How cryptojacking works and how to avoid becoming a victim? • What is hiding in malicious Docker images and how to protect yourself?

Related topics:

More from this channel

Upcoming talks (9)
On-demand talks (868)
Subscribers (54321)
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa