DevOps, Cloud Security, Configuration management, Attack simulation

ASW #112

June 29, 2020

Sponsored By

sponsor
Visit https://securityweekly.com/accurics for more information!

Teams building Infrastructure as Code still need to ensure that the infrastructure deployed matches the code they created. Not only can IaC help establish secure environments, analyzing that code can help identify when environments have drifted from security baselines or even highlight when misconfigurations lead to exploitable vulns.

To learn more about Accurics, visit: https://securityweekly.com/accuricsVisit https://www.securityweekly.com/asw for all the latest episodes!
Full Episode Show Notes

Using IaC to Establish & Analyze Secure Environments

Hosts

Matt Alderman

Matt Alderman – CEO

Mike Shema

Mike Shema – Product Security Lead

Guests

Cesar Rodriguez

Cesar Rodriguez – Head of Developer Advocacy

Announcements

  • Join the Security Weekly Mailing List & receive your invite to our community Discord server by visiting securityweekly.com/subscribe and clicking the button to join the list!
  • With all the recent changes to BlackHat and DefCon, we realized we can keep doing what we do best – host virtual podcasts! I’m proud to announce Hacker Summer Camp 2020, a Security Weekly Virtual, Live-Stream Event, August 3 – August 6, 2020. To reserve your slot now, visit: securityweekly.com/summercamp2020

DLL Hijacking at the Trend Micro Password Manager, Adobe Prompts Users to Uninstall Flash Player As EOL Date Looms, The State of Open Source Security 2020, Microservices vs. Monoliths: Which is Right for Your Enterprise?, What Modern CI/CD Should Look Like, and Build trust through better privacy!Visit https://www.securityweekly.com/asw for all the latest episodes!
Full Episode Show Notes

DLL Hijacking, Trust Through Privacy, & Adobe EOL Data

Hosts

Matt Alderman

Matt Alderman – CEO

Mike Shema

Mike Shema – Product Security Lead

Announcements

  • We are looking for high-quality guest suggestions for all of our podcasts to fill our Q3 recording schedule! Submit your suggestions for guests by visiting securityweekly.com/guests and completing the form! We review suggestions monthly and will reach out to you once reviewed!
  • In our first July webcast, you will learn how to stitch and enrich flow data for security with VIAVI Solutions! Register for our upcoming webcasts or virtual trainings by visiting securityweekly.com/webcasts. Or visit securityweekly.com/ondemand to view our previously recorded webcasts!
prestitial ad