Channel: The Linux Foundation
Category: Science & Technology
Description: sponsored by Cado Security The cloud is complex. Data can be extremely difficult to access, or worse, disappear in the blink of an eye. While the ephemeral nature of cloud environments often makes an investigation seem like an impossible task, automation flips the script. By automating the most tedious parts of an in-depth investigation, including data capture and processing, analysts can get to the bottom of what happened without delays or headaches. Join us to discuss real-life attack techniques used to compromise AWS Linux and Kubernetes environments and how to gain the level of visibility and depth that’s required to respond to cloud incidents most efficiently.