Ransomware Riddle: Untying Cloud Security Mysteries - Ram Pliskin fwd:cloudsec 3,42 тыс. подписчиков Скачать
From Intrusion to Insight: Lessons learned from of a month long AWS compromise - Korstiaan Stam Скачать
The Dark Economy of Stolen Cloud Accounts in Phishing Attacks- Alessandro Brucato & Stefano Chierici Скачать
A practitioner's playbook to shift left & build secure serverless GenAI applications in public cloud Скачать
AWS Data Perimeter at USAA: Things we knew, things we thought we knew and things you should know! Скачать
Responding to Sophisticated Ransom Attacks in the Cloud: A Real-World Case Study - Yotam Meitar Скачать
Making Insights Driven Decisions in an Ecosystem of Ecosystems -Prahathess Rengasamy & Stephanie Shi Скачать
Who Touched My GCP Project? Understanding the Principal Part in Cloud Audit Logs - Gabriel Fried Скачать
Forged in Fire: Forging Multi-Cloud Open Source Swiss-Army Knife - Toni de la Fuente & Sergio Garcia Скачать
One Click, Six Services: Abusing The Dangerous Multi-service Orchestration Pattern - Liv Matan Скачать
How Citi Advanced Their Containment Capabilities Through Automation - Damien Burks, Elvis Veliz Скачать
IYKYK Negotiating the Scope of Security Audits Even if You DREAD... - Jasmine Henry, George Tang Скачать
Helping developers drink from a champagne flute and not a firehose ... - Tyson Garrett, Jason Nelson Скачать
AWS Identity Center: Extending Cloudsplaining to score Users & Permission set... - Rodrigo Montoro Скачать
From ‘huh ’ to privilege escalation finding vulnerabilities from a bug in the AWS... - Ben Bridts Скачать
IMDS The Gatekeeper to Your Cloud Castles And How to Keep the Dragons Out - Liv Matan, Lior Zatlavi Скачать
The Good, the Bad, and the Vulnerable: A comprehensive overview of... - Merav Bar, Amitai Cohen Скачать
CloudFox + CloudFoxable A Powerful Duo for Mastering the Art of Identifying and... - Seth Art Скачать
Tales From the Sewer A plumber’s view of building a data security platform - Christopher Webber Скачать
Patterns in S3 Data Access: Protecting and enhancing access to data banks, lakes,... - Josh Snyder Скачать
How do you set boundaries? AWS Permissions boundaries in large cloud environments - Kushagra Sharma Скачать
Human vs. Robot: Why you should automate your vulnerability management program - Keziah & Kadia Скачать
Auditing PassRole: Finding Hidden Trails of Problematic Privilege Escalation Permission - Noam Dahan Скачать
Abusing the Replicator: Silently Exfiltrating Data with the AWS S3 Replication Service - Kat Traxler Скачать
Cloudy With a Chance of Vulnerabilities: Finding & exploiting vulnerabilities in cloud - Sagi & Nir Скачать
"SELECT * for the Cloud: Simplify Cloud Security and Compliance with Cloudquery" - Saurabh Wadhwa Скачать
Blowing stuff up at scale with pitch perfect attack simulations - Rich Mogull and Will Bengtson Скачать
"Kubernetes Security: PSP deprecation is an opportunity for a new security model" - Ariel Shuper Скачать
"Access Undenied: Automatically discovering reasons for Access Denied messages in IAM" - Noam Dahan Скачать
Least-Privilege Kubernetes Authorization with OPA - Charlie Cetin, Daniel Popescu, & Quentin Long Скачать
"CloudTrail Logging Internals: A Methodology For Investigating AWS Security Incidents" - Eliav Levy Скачать