The past few years have witnessed a rapid surge in the use of SaaS applications across various industries. But with this growth comes a significant challenge: managing security and assessing risk in application connectivity.
At Netskope, we’ve talked a lot lately about how to safely enable ChatGPT and other generative AI applications such as Google Bard and Jasper. Why? As the saying goes, “There’s no going back.” Generative AI is here to stay and will have a transformative effect on our day-to-day lives whether we’re in technology or not.
Over the last couple of decades in the cybersecurity industry, I have observed how APIs have gained significant importance in modern cloud-based architectures over the past few decades. In fact, they account for over 80% of all web traffic. However, this increased usage has also made APIs vulnerable to cyber threats. A closer look reveals that APIs are now one of the most prominent threat vectors in the cybersecurity landscape.
In the ever-evolving landscape of cloud security, AWS Identity and Access Management (IAM) plays a critical role in safeguarding your AWS resources. By following IAM best practices, you can fortify your cloud environment, mitigate risks, and maintain granular control over access permissions. In this quick guide, we will review essential IAM best practices, from implementing least privilege to leveraging advanced features.
Cybercriminals continually evolve their techniques, leading to more successful phishing attacks. Using techniques such as text-based attacks that utilize social engineering and highly targeted spear phishing, bad actors are able to bypass traditional email security and land in their target’s inbox. According to the organizations surveyed for the 2023 Email Security Risk Report, 92% fell victim to phishing attacks.
00:00 Intro: welcome Chris!
03:05 Trends in cloud security, reflected at fwd:cloudsec
05:00 fwd:cloudsec submissions - more practitioners needed!
10:40 Blurring the lines: what does that practically means?
19:30 Cloud service providers maturity: their security posture evolved
24:30 Public Cloud Security Breaches
30:01 Public Cloud Security Breaches demo
32:35 the Last Pass attack deep dive
38:00 Identify the crown jewels!
GitHub's Push Protection is now free for all public repositories, a significant milestone for open-source security! Find out the key points you need to keep in mind before using it to safeguard your code repositories.