Artwork

المحتوى المقدم من Palo Alto Networks and N2K Networks, Palo Alto Networks, and N2K Networks. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Palo Alto Networks and N2K Networks, Palo Alto Networks, and N2K Networks أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !

Dangers of Cloud Misconfigurations

37:54
 
مشاركة
 

Manage episode 460129788 series 3591118
المحتوى المقدم من Palo Alto Networks and N2K Networks, Palo Alto Networks, and N2K Networks. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Palo Alto Networks and N2K Networks, Palo Alto Networks, and N2K Networks أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

In this episode of Threat Vector, host David Moulton speaks with Margaret Kelley, a seasoned Digital Forensics and Incident Response Senior Consultant at Palo Alto Networks’ Unit 42. With a deep expertise in cloud security, Margaret shares insights into the evolving landscape of cloud breaches and how organizations can defend against sophisticated attacks. From misconfigurations to control plane vulnerabilities, the discussion covers the most critical aspects of securing cloud environments. Margaret's real-world examples provide listeners with valuable lessons on how attackers exploit cloud vulnerabilities and what defenders can do to stay ahead. Tune in to learn practical strategies for fortifying your cloud defenses and keeping your organization secure.

Margaret’s most recent articles are Leaked Environment Variables Allow Large-Scale Extortion Operation of Cloud Environments and Bling Libra’s Tactical Evolution: The Threat Actor Group Behind ShinyHunters Ransomware.

Join the conversation on our social media channels:


About Threat Vector

Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.

The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.

Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.


Palo Alto Networks

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠

  continue reading

51 حلقات

Artwork
iconمشاركة
 
Manage episode 460129788 series 3591118
المحتوى المقدم من Palo Alto Networks and N2K Networks, Palo Alto Networks, and N2K Networks. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Palo Alto Networks and N2K Networks, Palo Alto Networks, and N2K Networks أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

In this episode of Threat Vector, host David Moulton speaks with Margaret Kelley, a seasoned Digital Forensics and Incident Response Senior Consultant at Palo Alto Networks’ Unit 42. With a deep expertise in cloud security, Margaret shares insights into the evolving landscape of cloud breaches and how organizations can defend against sophisticated attacks. From misconfigurations to control plane vulnerabilities, the discussion covers the most critical aspects of securing cloud environments. Margaret's real-world examples provide listeners with valuable lessons on how attackers exploit cloud vulnerabilities and what defenders can do to stay ahead. Tune in to learn practical strategies for fortifying your cloud defenses and keeping your organization secure.

Margaret’s most recent articles are Leaked Environment Variables Allow Large-Scale Extortion Operation of Cloud Environments and Bling Libra’s Tactical Evolution: The Threat Actor Group Behind ShinyHunters Ransomware.

Join the conversation on our social media channels:


About Threat Vector

Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.

The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.

Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.


Palo Alto Networks

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠

  continue reading

51 حلقات

كل الحلقات

×
 
Loading …

مرحبًا بك في مشغل أف ام!

يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.

 

دليل مرجعي سريع

استمع إلى هذا العرض أثناء الاستكشاف
تشغيل