The Defender's Paradox: Why Traditional Vulnerability Management is Failing Cloud-Native Organizations

Logo
Presented by

Tom Poole, Senior Sales Engineer at Orca Security & Ashleigh Lee, Senior Product Marketing Manager Orca Security

About this talk

Over the last 25 years, we have lived through several iterations of answering the question, “What security issue is most important to resolve?” Even with all of the advancements in code scanning, cloud workload protection, and visualizing attack paths to prevent compromise, developers and security teams need a more defensible way to determine what gets fixed first. Reachability analysis aims to solve this problem. Join this webinar to learn about: The evolution of vulnerability management from hypothetical risk to likely to be exploited The intersection of application security and cloud security Reachability analysis and what’s next for protecting cloud native applications
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (104)
Subscribers (25448)
Orca Security is the industry-leading Cloud Security Platform that identifies, prioritizes, and remediates security risks and compliance issues across your cloud estate spanning AWS, Azure, Google Cloud and Kubernetes.