Threat Vector by Palo Alto Networks cover image

The 90,000 Credential Wake-Up Call

Threat Vector by Palo Alto Networks

00:00

The Double-Edged Sword of Automation in Cloud Security

This chapter explores how automation in cloud environments enhances efficiency while simultaneously increasing security risks. It emphasizes the tactics used by threat actors, particularly their use of legitimate tools, and stresses the necessity for vigilant monitoring to detect potential security breaches.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app