Thank you!
Error - something went wrong!

The Anatomy Of A Cloud Hack

April 2, 2020

This session explores Cloud Security Breaches, and how available reconnaissance techniques and tools are leveraged by unethical hackers to successfully uncover vulnerabilities. Learn how cloud security differs from conventional security and how to utilize cloud services to perform continuous monitoring and defence.

Previous Video
OWASP Top 10: Introduction
OWASP Top 10: Introduction

The OWASP Top 10 is a standard awareness document for developers and web application security. It represent...

Next Article
Claranet | Tools of the Trade
Claranet | Tools of the Trade

Achieving DevSecOps with open-source tools.