
Sign up to save your podcasts
Or
Most organizations rely on cloud services or infrastructure to power their day-to-day operations — and adversaries know it. In this episode, we’ll explore how threat actors use the cloud to their advantage: how they breach cloud environments, the actions they take once they’re in, and the ways they use the cloud as a tool in their attacks. We’ll also discuss how organizations often unknowingly put their cloud environments at risk and the steps they can take to strengthen their cloud security.
The cloud is the new attack surface. Get an overview of today’s cloud threat landscape and actionable steps to combat cloud adversaries in the on-demand replay of CrowdStrike’s Cloud Threat Summit. Watch now: https://www.crowdstrike.com/events/cloud-threat-summit/
4.9
7575 ratings
Most organizations rely on cloud services or infrastructure to power their day-to-day operations — and adversaries know it. In this episode, we’ll explore how threat actors use the cloud to their advantage: how they breach cloud environments, the actions they take once they’re in, and the ways they use the cloud as a tool in their attacks. We’ll also discuss how organizations often unknowingly put their cloud environments at risk and the steps they can take to strengthen their cloud security.
The cloud is the new attack surface. Get an overview of today’s cloud threat landscape and actionable steps to combat cloud adversaries in the on-demand replay of CrowdStrike’s Cloud Threat Summit. Watch now: https://www.crowdstrike.com/events/cloud-threat-summit/
1,986 Listeners
364 Listeners
638 Listeners
369 Listeners
180 Listeners
1,013 Listeners
406 Listeners
7,959 Listeners
174 Listeners
189 Listeners
316 Listeners
77 Listeners
128 Listeners
43 Listeners
169 Listeners