Cloud Security Risks: Exploring the latest Threat Landscape Report

Поделиться
HTML-код
  • Опубликовано: 21 ноя 2024

Комментарии • 47

  • @mneiferbag
    @mneiferbag Месяц назад +10

    Hhm, nice video, but it only mentions "cloud" in the first second and in the last seconds. XSS and credentials vulnerabilities are not cloud security risks. You could have these vulnerabilities with a single web server too. With this video title, I would have expected some more cloudy...

  • @Ninj4-b3r
    @Ninj4-b3r Месяц назад +10

    Something that wasn’t discussed here was that BEC attacks often use AITM techniques to steal sessions bypassing MFA and how to protect against it

  • @jervahnmorgan
    @jervahnmorgan Месяц назад +3

    Good job, thank you. Please keep the videos coming.

  • @tbadi-Tonny
    @tbadi-Tonny Месяц назад +8

    Simple and straightforward

    • @jeffcrume
      @jeffcrume Месяц назад +1

      Glad you liked it!

  • @livinglikeahuman7918
    @livinglikeahuman7918 Месяц назад +1

    Currently learning cybersec and definitely interested in the cloud and cloud engineering. Wish me luck ive heard its competitive 😅

  • @nelsonmatembissa5771
    @nelsonmatembissa5771 Месяц назад +4

    Always glad to see a new upload. Once again a great video! Thanks!

    • @jeffcrume
      @jeffcrume Месяц назад +2

      Thanks so much!

  • @AlessandroSqueo
    @AlessandroSqueo 8 дней назад

    How do you project the glass board? That is very interesting. Writing in reverse?

  • @naridabanucio2828
    @naridabanucio2828 Месяц назад +2

    Excellent lesson, short, comprehensive an clear.

  • @martinlastname8548
    @martinlastname8548 Месяц назад +4

    What a great explanation of XSS

    • @jeffcrume
      @jeffcrume Месяц назад +1

      Glad you liked it. I have another video coming up that goes a little deeper into XSS exclusively

  • @dofilamingo8848
    @dofilamingo8848 Месяц назад +1

    amazing video as usual

  • @harsimarkandhari4045
    @harsimarkandhari4045 Месяц назад +1

    Thanks a lot, I was just checking out the X Force Cloud Threat Landscape Report and it is great to have such a wonderful explanation for it !!

    • @jeffcrume
      @jeffcrume Месяц назад

      I’m glad you liked it!

  • @GeorgeBentes
    @GeorgeBentes 26 дней назад +1

    Awesome tips! I'll take a look in this passkeys business

    • @jeffcrume
      @jeffcrume 25 дней назад

      Sure! You might check out the two videos I did on FIDO passkeys here on the IBM Technology channel

  • @robertfoertsch
    @robertfoertsch Месяц назад +3

    Excellent Analysis, Deployed Worldwide Through My Deep Learning AI Research Library.
    Thank You ❤

  • @Seansaighdeoir
    @Seansaighdeoir Месяц назад +1

    Nothing about the biggest security risk of all of putting your companies personal data into an entity you are forced to trust and who you have no control over - the big tech cloud drivers like MS Azure, Google, AWS and of course IBM.

  • @tharukapavith8195
    @tharukapavith8195 Месяц назад +1

    Very informative content!

  • @gersonbarrientos1580
    @gersonbarrientos1580 Месяц назад +1

    Very good! I love this video

  • @AjaySingh-ey7gt
    @AjaySingh-ey7gt 23 часа назад

    nice video

  • @carsonjamesiv2512
    @carsonjamesiv2512 Месяц назад +1

    GOOD EXPLANATION!😃👍🎉

  • @BrandonSorenson-fb3gg
    @BrandonSorenson-fb3gg Месяц назад

    Jerry Bell is also an interesting person to listen to on security

  • @rmcgraw7943
    @rmcgraw7943 Месяц назад

    Given that the mitigation techniques mentioned here have been around for decades, I would suggests that employee EDUCATION and a policy of least privilege to eliminate 95% of all attack vectors. All of what he discusses here is good, but the 2 above tactics are the 2 biggest ones.

  • @BSECAEnerggy
    @BSECAEnerggy 26 дней назад +1

    Facts!

  • @sk3ffingtonai
    @sk3ffingtonai Месяц назад +1

    👍 Thank you for sharing.

    • @jeffcrume
      @jeffcrume Месяц назад

      Thanks for watching!

  • @miguelcano6396
    @miguelcano6396 Месяц назад +1

    Nice

  • @JikeWimblik
    @JikeWimblik Месяц назад

    So how do you interpret the bot activity data with good bots like defending connection integrity and bad bots like stealth action bots for ransom ware for example. How could an os use good bot a activity to benefit os security. And less direct security issues with bots for example manipulating audience attraction getting in the way of users reaching better content more suited to what their looking for. It'd be nice to get emailed by a bot if your a system admin if a security flaw has been found. Maybe their should be a communications service for bots that keeps the security bods more informed of the current bot activity climate.

  • @miraculixxs
    @miraculixxs Месяц назад +1

    XSS: if some guy can insert links on your web page you have a lot of problems worse than XSS

  • @miraculixxs
    @miraculixxs Месяц назад

    Source for those 600bn$?

  • @chancesire
    @chancesire Месяц назад +1

    🔥

  • @Cysecsg
    @Cysecsg Месяц назад

    These are not cloud-specific risks

  • @velo1337
    @velo1337 Месяц назад

    dont forget, cross side scripting is not always bad.

    • @gersonbarrientos1580
      @gersonbarrientos1580 Месяц назад

      Wait what? What do you mean lol

    • @Thiago1337
      @Thiago1337 Месяц назад

      @@gersonbarrientos1580 I think he means reflected xss without chaining it with other vulnerabilites

  • @mr.RAND5584
    @mr.RAND5584 Месяц назад

    htmlspecialchars😊

  • @VictorEstrada
    @VictorEstrada Месяц назад +10

    Sorry man, but all you talked about was just email phishing, nothing related to the title.

    • @oldones59
      @oldones59 Месяц назад +3

      Stop whining. Look elsewhere and educate yourself.

  • @rn8923
    @rn8923 Месяц назад

    First