Key threats to sensitive data in the cloud

In the session, Anthony will explore cloud storage specific security considerations. This short, but informative, webinar will examine real-world examples of how common misconfigurations can lead to vulnerabilities which unethical hackers can exploit to gain access to sensitive information stored in the cloud. These kinds of vulnerabilities are all the more prevalent due to the inability of traditional vulnerability scanners to detect them.

Anthony covers live demonstrations of malicious actors modus operandi including enumeration and exploitation. We will be giving an automated storage audit tool which will allow you to determine your own level of risk in your storage deployment. There will be time for you to quiz our cloud security expert too - Not just on storage but anything cloud related across all three vendors! 

Previous Video
Webinar | Beating bad actors to find vulnerabilities in your systems
Webinar | Beating bad actors to find vulnerabilities in your systems

Rob Jepson, Research and Innovation Lead at Claranet, unveils our brand new webinar surrounding finding vul...

Next Video
From point in time to continuous testing: how application security is changing
From point in time to continuous testing: how application security is changing

In the past, cybersecurity threats were slow to emerge and relatively easy to contain. But then the world c...