1:07:15
Centralizing Cloud Logs and Events with Microsoft Sentinel
178 views • 5 days ago
23:21
Operating System Command Injection
369 views • 13 days ago
31:38
HANDS-ON WORKSHOP: Prevent Remote Code Executions with Private Endpoints: Aviata Chapter 2
132 views • 2 weeks ago
1:08:04
HANDS-ON WORKSHOP: Making Mistakes Publicly, Cloud Edition: Aviata Chapter 1
197 views • 2 weeks ago
15:26
Preventing SQL Injection in Python
376 views • 2 weeks ago
1:00:28
Prevent Cloud Incidents from Becoming Cloud Breaches
277 views • 3 weeks ago
0:49
The 8 Domains of the Cloud Security Maturity Model
177 views • 4 weeks ago
46:25
JWTs The Good, the Bad, and the Ugly Security Edition
319 views • 2 months ago
15:34
Secure Service Configuration Poster Resource Demo
398 views • 2 months ago
16:08
Multicloud Command Line Cheat Sheet Resource Demo
446 views • 3 months ago
59:07
Cloud Flight Simulator Part 4: Least Privileged Pods with Kubernetes Workloads
177 views • 3 months ago
58:18
Cloud Flight Simulator Part 3 Safeguarding the Software Supply Chain
158 views • 3 months ago
1:00:01
Cloud Flight Simulator Part 2: Protecting Kubernetes Clusters with Admission
182 views • 4 months ago
56:40
Cloud Flight Simulator Part 1: GitLab CI, Workflows, and Secrets
882 views • 4 months ago
50:05
Nate Lee: Building a GenAI Security App for Fun (and No Profit) | Season 2, Ep 10
285 views • 5 months ago
58:18
Fred Bret-Mounet: Eating Pasta and Not Building Fort Knox | Season 2 Ep9
69 views • 5 months ago
2:45
Get to Know Brandon Evans, SANS Certified Instructor, Lead Author of SANS SEC510
100 views • 6 months ago
31:39
Failing to Scale: Bumps in the Road While Scaling Cloud Access
137 views • 6 months ago
29:54
How Ramp Manages Authorization in the Cloud and Achieves Least Privilege
109 views • 6 months ago
30:46
Crossing the Bridge - A Journey Through Attack Vectors in Managed Kubernetes Services
183 views • 6 months ago
40:31
Keynote | The Latest Cloud Security Megatrend: AI for Security
676 views • 6 months ago
33:40
Practical Security Monitoring and Response in Microsoft Azure
400 views • 6 months ago
30:50
Beyond the Perimeter: Uncovering the Hidden Threat of Data Exfiltration in Google Cloud Platform
138 views • 6 months ago
29:46
Oops, I Leaked It Again - How We Found PII in Exposed RDS Snapshots
111 views • 6 months ago
29:31
Real World Lessons Learned from 18 months of CIEM implementations in the Enterprise
381 views • 6 months ago
32:34
Detection and remediation playbook in GCP
126 views • 6 months ago
25:36
eBPF Superpowers for Enhanced Cloud Native Security
105 views • 6 months ago
30:51
Cloud Security: What Works and What Doesn't
196 views • 6 months ago
30:07
Detective Controls in K8s Environments – Wrangling Security Data Out Of Your Clusters
271 views • 6 months ago
39:19
Keynote | Go Beyond Gatekeeping: A Systems Design Approach to Security Engineering
618 views • 6 months ago
Load More