Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Webinar Today: Blast Radius & Simulated Attack Paths

Webinar: Blast Radius & Simulated Attack Paths: The Keys to Securing Your Cloud with Agility & Speed

Webinar: Blast Radius & Simulated Attack Paths: The Keys to Securing Your Cloud with Agility & Speed

Security teams need a new mindset to keep up with the risks created by modern devops practices in the cloud.

Visibility into attack paths and a vulnerability’s blast radius is required to truly manage security risks. Teams need to evaluate and prioritize vulnerabilities based on their potential impact to the business, with insight into the risks unique to the host. For example, if you don’t know every identity on your workload and what access their permissions allow, you can’t see which vulnerabilities could lead to an over permissioned identity with crown-jewel data access.


Join this webinar on Wednesday, May 4, 2022 at 2:00 pm EDT to see how security teams are benefiting from the unique combination of agentless vulnerability scanning, CSPM, CIEM, data protection and automation to bring their public cloud to a state of security excellence.
Jeff Moncrief, Field CTO of Sonrai Security, will discuss and demonstrate the following:

● Why workload vulnerability scanning is only step one in a comprehensive cloud security strategy

● How attackers are exploiting vulnerabilities in your cloud through attack paths that lead to your most sensitive data

● The technological advantages of agentless scanning and governance automation for managing risk “at the speed of cloud”

● How understanding “blast radius”, “risk amplification” and vulnerabilities unique to the host can help you prioritize risks in your cloud and speed up your remediation strategies
Register
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Cloud Security

VMware described the bug as an out-of-bounds write issue in its implementation of the DCE/RPC protocol. CVSS severity score of 9.8/10.