The past few years have witnessed a rapid surge in the use of SaaS applications across various industries. But with this growth comes a significant challenge: managing security and assessing risk in application connectivity.
Cybercriminals continually evolve their techniques, leading to more successful phishing attacks. Using techniques such as text-based attacks that utilize social engineering and highly targeted spear phishing, bad actors are able to bypass traditional email security and land in their target’s inbox. According to the organizations surveyed for the 2023 Email Security Risk Report, 92% fell victim to phishing attacks.
In the ever-evolving landscape of cloud security, AWS Identity and Access Management (IAM) plays a critical role in safeguarding your AWS resources. By following IAM best practices, you can fortify your cloud environment, mitigate risks, and maintain granular control over access permissions. In this quick guide, we will review essential IAM best practices, from implementing least privilege to leveraging advanced features.
00:00 Intro: welcome Chris!
03:05 Trends in cloud security, reflected at fwd:cloudsec
05:00 fwd:cloudsec submissions - more practitioners needed!
10:40 Blurring the lines: what does that practically means?
19:30 Cloud service providers maturity: their security posture evolved
24:30 Public Cloud Security Breaches
30:01 Public Cloud Security Breaches demo
32:35 the Last Pass attack deep dive
38:00 Identify the crown jewels!
Whether you use the 600+ Styra provided compliance rules or build your own, with Styra DAS, the same rules can now enforce compliance of your Kubernetes and Terraform infrastructure across all of the Code, Deploy, and Run phases.
In our first-ever Cloud Threat Summit, CrowdStrike’s Senior Vice President of Intelligence and Senior Director of Consulting Services discussed the most common ways adversaries breach the cloud and the steps organizations can take to stay safe.
We have exciting news to share! Salt Security is building a bi-directional integration with the Wiz cloud security platform! With this announcement, Salt becomes the first API security vendor to build a two-way integration with Wiz, giving Wiz customers the deepest and most actionable insights into API behaviors – all within Wiz’s comprehensive cloud security platform.