Discover this podcast and so much more

Podcasts are free to enjoy without a subscription. We also offer ebooks, audiobooks, and so much more for just $11.99/month.

Cloud configuration security: Breaking the endless cycle. [CyberWire-X]

Cloud configuration security: Breaking the endless cycle. [CyberWire-X]

FromCyberWire Daily


Cloud configuration security: Breaking the endless cycle. [CyberWire-X]

FromCyberWire Daily

ratings:
Length:
33 minutes
Released:
Oct 3, 2021
Format:
Podcast episode

Description

Moving to the cloud creates a tremendous opportunity to get security right and reduce the risk of data breach. But most cloud security initiatives get underway after services are deployed in the cloud. It’s frustrating when major breaches resulting from basic mistakes, like S3 buckets left unsecured or secrets exposed. Continually checking for risky configurations and unusual behavior in cloud logs is a requirement, but there is an opportunity to be proactive. What if you could configure your security and access controls as you set up cloud infrastructure? The CyberWire's Rick Howard speaks with Hash Table members Kevin Ford of North Dakota State government and Steve Winterfeld of Akamai, as well as sponsor Sysdig's Omer Azaria to discuss how security teams are adopting Infrastructure as Code (IaC) security as part of their overall cloud security strategy to reduce risk.
Released:
Oct 3, 2021
Format:
Podcast episode