Securing Cloud & Automation: Keep Friends Close & Enemies Closer– Session 3 of 3

January 8, 2021

In this session we will discuss how the global pandemic has accelerated digital transformation, bringing more automation and cloud adoption but how ultimately, despite the changing landscape, the attackers’ methods and route are still the same – identity compromise. We discuss the identities, credentials and secrets used and how to protect them.

Previous Article
Endpoint Security Review: a Defense-in-depth Perspective on Ransomware
Endpoint Security Review: a Defense-in-depth Perspective on Ransomware

Explore the 5 essential elements of a defense-in-depth approach to ransomware protection. Multi-layered end...

Next Article
Analyzing Ransomware and Potential Mitigation Strategies
Analyzing Ransomware and Potential Mitigation Strategies

Ransomware, one of the most pervasive and dangerous threats facing organizations today is everywhere. Read ...