Real World Cloud Attack 3: Compromising Sensitive Console Access

April 16, 2021

Cloud consoles, whether cloud providers or for cloud resources such as container orchestration, are big targets for compromise. These coveted cloud targets are easily overlooked by cloud security teams and often left unintentionally publicly exposed and unprotected. This video walks through a real world attack on a sensitive cloud console.

Previous Video
Bridging the Cyber Divide: Episode 8 - Security in Transformation
Bridging the Cyber Divide: Episode 8 - Security in Transformation

Barak Feldman, SVP and Thomas Fikentscher, Regional Director at CyberArk discuss security in transformation...

Next Video
Real World Cloud Attack 2: Embedded Credentials in Code
Real World Cloud Attack 2: Embedded Credentials in Code

Just as credentials in code residing on premises could be compromised and used to escalate privileges, the ...

Gartner Names CyberArk a Leader in the 2021 Magic Quadrant for PAM

Download Now