Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Webinar Today: Blast Radius & Simulated Attack Paths

Webinar: Blast Radius & Simulated Attack Paths: The Keys to Securing Your Cloud with Agility & Speed

Webinar: Blast Radius & Simulated Attack Paths: The Keys to Securing Your Cloud with Agility & Speed

Security teams need a new mindset to keep up with the risks created by modern devops practices in the cloud.

Visibility into attack paths and a vulnerability’s blast radius is required to truly manage security risks. Teams need to evaluate and prioritize vulnerabilities based on their potential impact to the business, with insight into the risks unique to the host. For example, if you don’t know every identity on your workload and what access their permissions allow, you can’t see which vulnerabilities could lead to an over permissioned identity with crown-jewel data access.


Join this webinar on Wednesday, May 4, 2022 at 2:00 pm EDT to see how security teams are benefiting from the unique combination of agentless vulnerability scanning, CSPM, CIEM, data protection and automation to bring their public cloud to a state of security excellence.
Jeff Moncrief, Field CTO of Sonrai Security, will discuss and demonstrate the following:

● Why workload vulnerability scanning is only step one in a comprehensive cloud security strategy

● How attackers are exploiting vulnerabilities in your cloud through attack paths that lead to your most sensitive data

● The technological advantages of agentless scanning and governance automation for managing risk “at the speed of cloud”

● How understanding “blast radius”, “risk amplification” and vulnerabilities unique to the host can help you prioritize risks in your cloud and speed up your remediation strategies
Register

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Cloud Security

Cloud Disaster Recovery - Ingredients for a Recipe that Saves Money and Offers a Safe, More Secure Situation with Greater Accessibility

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...