Cloud Security

Watch Now: Cloud & Data Security Summit Sessions

Watch Cloud & Data Security Summit sessions to learn how to utilize tools, controls, and design models needed to properly secure cloud environments.

All sessions from SecurityWeek’s 2023 Cloud & Data Security Summit are now available to easily watch on demand.

Login to the virtual platform to access all sessions and learn how to utilize tools, controls, and design models needed to properly secure cloud environments.

Sessions Include: (View Full Agenda)

  • Inside the Microsoft 365 Zero-Day Attack and the Cost of Cloud Visibility
  • Combating API and SaaS Attack Surface Sprawl
  • Penetrating the Cloud: Uncovering Unknown Vulnerabilities
  • Securing the Cloud: Offensive Security Strategies for Risk Mitigation
  • Security is as Critical as Quality
  • Fireside Chat: Mick Baccio, Global Security Advisor, Splunk
  •  Five Keys for Creating a Successful Disaster Recovery Plan
  • + Virtual Expo Hall & Technical Resources

Related Content

Cloud Security

Cloud security giant Wiz has raised $1 billion, which brings the total funding to $1.9 billion, at a valuation of $12 billion.

Cloud Security

Cloud security specialists found data exposure risk associated with Azure, AWS, and Google Cloud command-line tools.

Artificial Intelligence

Google adds AI to cloud security features and announces other security capabilities for cloud customers.

Cloud Security

New Ahoi attacks Heckler and WeSee target AMD SEV-SNP and Intel TDX with malicious interrupts to hack confidential VMs.

Cloud Security

Cloud security firm provides a detection platform able to detect and predict the likely behavior of ‘bad’ identities.

Cloud Security

Please the fireside chat as Phil Bues, Cloud Research Manager at IDC, discusses the challenges and best practices for cybersecurity leaders managing cloud identities.

Cloud Security

The CloudGrappler open source tool can detect the presence of known threat actors in cloud environments.

Malware & Threats

A new malware campaign has been observed targeting misconfigured Apache Hadoop, Confluence, Docker, and Redis instances.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version