Offensive Cloud Security Program for 2024
Dec 19, 2023
•
NetSPI
Understand Your Cloud Security Landscape to cut through the noise!
Dec 15, 2023
•
Panoptica (CISCO)
Kubernetes Network Security for Multi Tenancy
Dec 8, 2023
•
Shopify
eBPF - Kubernetes Network Security without the Blind Sides!
Dec 2, 2023
•
Isovalent
Attack Path Analysis for Better Kubernetes Security
Nov 22, 2023
•
Outshift by Cisco
Secure your SaaS applications like this!
Nov 21, 2023
•
AppOmni
Threat Detection for not so common Cloud Services
Nov 10, 2023
•
Sysdig
Have I lost my Secrets?
Nov 6, 2023
•
GitGuardian
How to Escape Clusters in a Managed Kubernetes Cluster?
Nov 1, 2023
•
Datadog
How to become a Senior Cloud Security Engineer?
Oct 15, 2023
•
Become a Cloud Native CISO in 2023
Oct 2, 2023
•
Hitch Partners
Software Supply Chain Controls for Terraform
Sep 21, 2023
•
Rippling
Data Security RoadMap in 2023
Sep 18, 2023
•
Cyera
The Cloud to Code Dilemma - Let's Talk
Sep 9, 2023
•
Tromzo
Preventative Cloud Security Explained!
Sep 7, 2023
•
Kivera
Privileged Access Management in Large Cloud Environments
Sep 6, 2023
•
Entitle
CISO Perspective: Josh Lemos, CISO of GitLab
Sep 6, 2023
•
Josh Lemos, CISO GitLab
Learning Terraform as a Cloud Software Engineer
Aug 29, 2023
•
Nina Boothby
Azure Cloud Security Pentesting Skills
Aug 28, 2023
•
Karl Fosaaen, NetSPI
How to detect software supply chain attacks with Honeytokens?
Aug 25, 2023
•
GitGuardian
Google Cloud Security Pentesting Methodology
Aug 25, 2023
•
Kat Traxler
Network Pentest 2.0 : The Cloud Pentest Revolution
Aug 23, 2023
•
Seth Art, BishopFox
Centralised Credential Management in the Cloud
Aug 18, 2023
•
Somerford Associates
High Performance Computing in AWS Explained !
Aug 16, 2023
•
Amazon Web Services (AWS)
Google Cloud Hacking Red Team Perspective!
Aug 2, 2023
•
Shannon McHale, Mandiant (Google Cloud)
Cloud Security in the BoardRoom - CISO Perspective with Phil Venables
Jul 30, 2023
•
Phil Venables, Google Cloud CISO
Google Cloud IAP - A Pentester Viewpoint
Jul 26, 2023
•
Anjali S, NotSoSecure
Doing Google Cloud Security RIGHT!
Jul 25, 2023
•
Global Fintech in UK
An AWS Centric View of Google Cloud Identity!
Jul 23, 2023
•
Sequoia Capital
So You WANT TO DO Google Cloud Threat Detection – Start here!
Jul 10, 2023
•
Datadog
Using Data Perimeters in AWS To Scale Guardrails
Jul 6, 2023
•
Stripe
AWS INCIDENT RESPONSE – Automate Containment
Jul 5, 2023
•
Citi
Cloud Security Baseline For Scale
Jun 29, 2023
•
Robolox
AWS ReInforce 2023 Recap & Highlights
Jun 17, 2023
•
Cloud Security Podcast
Will Application Security Eat Cloud Security for Lunch!
May 31, 2023
•
Cloud Security Podcast, We Hack Purple, Cobalt.io
Evolution of Kubernetes Security | KubeCon EU 2023
May 14, 2023
•
Control Plane, Snyk, Hashicorp
A DEV FRIENDLY CLOUD NATIVE SECURITY PIPELINE!
May 11, 2023
•
The New Work Times
THEY SCANNED ENTIRE GITHUB FOR SECRETS AND FOUND THIS!
May 10, 2023
•
GitGuardian
Kubernetes Cluster Security Audit Explained
May 3, 2023
•
Shopify
Network Security for Kubernetes
Apr 16, 2023
•
Isovalent
CONTINUOUS KUBERNETES SECURITY IN 2023
Apr 14, 2023
•
Control Plane
2023 What Kubernetes Security Looks Like Today Series- DevSecOps
Apr 14, 2023
•
Red Hat
IS THERE DEVSECOPS IN CLOUD?
Mar 27, 2023
•
Snyk
How to Build a Modern Cyber Security Program in 2023
Mar 14, 2023
•
RegScale
HOW TO BUILD A CLOUD SECURITY PROGRAM – MEDIA INDUSTRY
Mar 6, 2023
•
Warner Bros Discovery
How to Accelerate your AWS Security Maturity in 2023
Feb 26, 2023
•
AWS
How to Build AWS Multi-Account Infrastructure with Security and Speed
Feb 21, 2023
•
Netflix
HOW TO GET FEDRAMP CERTIFIED IN AWS
Feb 14, 2023
•
AWS
HOW TO BUILD A CLOUD SECURITY PROGRAM WITH CONTAINERS
Feb 5, 2023
•
Warner Bros Discovery
AWS Cloud Penetration Testing Explained with Example
Jan 30, 2023
•
Bishop Fox
AWS Goat – Cloud Penetration Testing
Jan 24, 2023
•
INE
Getting Started with Hacking AWS ECS!
Jan 12, 2023
•
LightSpin
Getting Started with Hacking AWS CLOUD!
Jan 8, 2023
•
DataDog