Real World Cloud Attack 3: Compromising Sensitive Console Access

April 16, 2021

Cloud consoles, whether cloud providers or for cloud resources such as container orchestration, are big targets for compromise. These coveted cloud targets are easily overlooked by cloud security teams and often left unintentionally publicly exposed and unprotected. This video walks through a real world attack on a sensitive cloud console.

Previous Video
Designing Automation Workflows – What’s New With Cloud Entitlements Manager
Designing Automation Workflows – What’s New With Cloud Entitlements Manager

See what’s new with Cloud Entitlements Manager and explore best practices for designing automation workflow...

Next Video
Real World Cloud Attack 2: Embedded Credentials in Code
Real World Cloud Attack 2: Embedded Credentials in Code

Just as credentials in code residing on premises could be compromised and used to escalate privileges, the ...

Gartner Names CyberArk a Leader in the 2021 Magic Quadrant for PAM

Download Now