Security teams need a new mindset to keep up with the risks created by modern devops practices in the cloud.
Visibility into attack paths and a vulnerability’s blast radius is required to truly manage security risks. Teams need to evaluate and prioritize vulnerabilities based on their potential impact to the business, with insight into the risks unique to the host. For example, if you don’t know every identity on your workload and what access their permissions allow, you can’t see which vulnerabilities could lead to an over permissioned identity with crown-jewel data access.
Join this webinar on Wednesday, May 4, 2022 at 2:00 pm EDT to see how security teams are benefiting from the unique combination of agentless vulnerability scanning, CSPM, CIEM, data protection and automation to bring their public cloud to a state of security excellence.
Jeff Moncrief, Field CTO of Sonrai Security, will discuss and demonstrate the following:
● Why workload vulnerability scanning is only step one in a comprehensive cloud security strategy
● How attackers are exploiting vulnerabilities in your cloud through attack paths that lead to your most sensitive data
● The technological advantages of agentless scanning and governance automation for managing risk “at the speed of cloud”
● How understanding “blast radius”, “risk amplification” and vulnerabilities unique to the host can help you prioritize risks in your cloud and speed up your remediation strategies
More from SecurityWeek News
- Threat Hunting Summit Virtual Event NOW LIVE
- Video: ESG – CISO’s Guide to an Emerging Risk Cornerstone
- Threat Modeling Firm IriusRisk Raises $29 Million
- SentinelOne Announces $100 Million Venture Fund
- Today: 2022 CISO Forum Virtual Event
- Cymulate Closes $70M Series D Funding Round
- SecurityWeek to Host CISO Forum Virtually September 13-14, 2022: Registration is Open
- Privilege Escalation Flaw Haunts VMware Tools
Latest News
- Anti-Bot Software Firm DataDome Banks $42M Financing
- Unpatched Security Flaws Expose Water Pump Controllers to Remote Hacker Attacks
- 500k Impacted by Data Breach at Debt Buyer NCB
- Chinese Cyberspies Use ‘Melofee’ Linux Malware for Stealthy Attacks
- Why Endpoint Resilience Matters
- Microsoft Cloud Vulnerability Led to Bing Search Hijacking, Exposure of Office 365 Data
- 3CX Confirms Supply Chain Attack as Researchers Uncover Mac Component
- UK Introduces Mass Surveillance With Online Safety Bill

Click to comment