Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

隨選網路研討會

Uncover Hidden Threats: Tenable Research Reveals Cloud Supply Chain Risks

On-Demand

Understanding and mitigating emerging risks to secure your cloud infrastructure more effectively.

The recent discovery of the critical remote code execution (RCE) vulnerability "CloudImposer" in Google Cloud Platform (GCP) workloads by Tenable Research highlights the pressing issue of supply chain vulnerabilities in the cloud. With millions of servers at risk and third-party code in IaC tools under scrutiny, it's vital to know who's responsible and how to defend your cloud environments. Let’s help you make that happen.

Check out this on-demand webinar for an in-depth exploration of these emerging risks. You will also gain insight into how Tenable Research works, the team’s recent discoveries, and practical mitigation strategies to protect your cloud infrastructure.

By attending, you will gain:

  • In-depth insights into recent cloud vulnerabilities and novel attack vectors
  • Understanding of how attackers can exploit these vulnerabilities to compromise your cloud environment
  • Actionable mitigation strategies to protect your infrastructure against emerging threats

哪些人應該參加?
Cloud architects and infosec professionals responsible for managing and reducing risk across public- and hybrid-cloud environments.

立即報名並觀看隨選網路研討會。

主講人:

Photo of Liv Matan, Senior Research Engineer, Tenable

Liv Matan

Senior Research Engineer, Tenable

Photo of Christina DePinto, Product Marketing Manager, Tenable

Christina DePinto

Product Marketing Manager, Tenable

Photo of Shelly Raban, Senior Research Engineer, Tenable

Shelly Raban

Senior Research Engineer, Tenable

Watch On-Demand Now