First Name
Last Name
Thank you!
Error - something went wrong!

The Anatomy Of A Cloud Hack

April 2, 2020

This session explores Cloud Security Breaches, and how available reconnaissance techniques and tools are leveraged by unethical hackers to successfully uncover vulnerabilities. Learn how cloud security differs from conventional security and how to utilize cloud services to perform continuous monitoring and defence.

Previous Video
Application Security For Developers
Application Security For Developers

As web application vulnerabilities are on the rise, it’s essential that developers increase their awareness...

Next Article
Quick read checklist for secure remote working
Quick read checklist for secure remote working

With remote working, the risk of a security breach rises significantly. Read our Administrator’s Guide for ...