
Risky Business #775 -- Cl0p is back, SEC hack disclosures disappoint
Risky Business
Navigating Cloud Identity and Access Risks
This chapter explores the complexities of managing identity and access in cloud environments, emphasizing the risks that arise from overly permissive access rights and inadequate monitoring. The speakers discuss the shift in cybersecurity approaches within organizations, advocating for a more strategic understanding of vulnerabilities and the importance of realistic training scenarios. They highlight tools like BloodHound for identity analysis, sharing insights on improving security assessments and addressing challenges in device management.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.