
Lessons Learned from Responding to Cloud Compromises
The Defender's Advantage Podcast
Securing Third-Party Identities in Cloud Environments
Exploring the complexities and risks involved in securing third-party identities with access to cloud environments, focusing on the challenges of enforcing stringent security measures and the importance of validating device access. The chapter also addresses supply chain security post SolarWinds incident, emphasizing the need to manage third-party risks separately while ensuring compliance with robust security protocols.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.