What Orca Security Can Teach us from Honeypotting Attackers in the Cloud

With more and more sensitive information and critical systems residing in the cloud, it’s essential for organisations to implement robust security measures to safeguard their cloud assets.

However, to do this in an effective manner, it’s critical to understand what attackers are looking for and how they operate.

In this webinar, we will discuss the results from the Orca Security ‘2023 Honeypotting in the Cloud Report’, offering important insights into what attracts potential attackers, as well as the tactics and techniques they use.

In this session, you’ll learn:

  • How quickly vulnerable assets can be discovered on GitHub, HTTP, SSH, S3 Buckets, etc
  • Resources: bad actors are more likely to attack
  • Advice on secrets management, authentication, malicious process monitoring, and more

Fill out the form on the right to watch the on-demand webinar.

Get your copy of the Webinar

Once submitted, you’ll gain access to the Webinar download immediately, and it will be sent to your inbox.