4.6 • 1K Ratings
🗓️ 17 August 2024
⏱️ 22 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | You're listening to the Cyber manage environments that you controlled. |
0:20.0 | Then came new technologies and new ways to work. Now employees, apps, and networks are everywhere. |
0:27.0 | This means poor visibility, security gaps, and added risk. |
0:31.0 | That's why Cloudflare created the first ever connectivity cloud. |
0:35.6 | Visit Cloud.com to protect your business everywhere you do business. Hello everyone and welcome to the CyberWire's research Saturday. |
0:56.0 | I'm Dave Bitner and this is our weekly conversation with researchers and analysts |
1:01.0 | tracking down the threats and vulnerabilities, |
1:03.5 | solving some of the hard problems and protecting ourselves |
1:06.8 | in a rapidly evolving cyberspace. |
1:09.4 | Thanks for joining us. So we're dealing with a lot of cloud security teams and also Dev-Ops themes with |
1:21.9 | with security teams and also Dev-O-S themes with securing the cloud and working with their |
1:23.7 | terraform and cloud formation and polemian environments. By doing that, we're |
1:28.9 | identifying many vulnerabilities and many maybe potential malicious providers and |
1:36.1 | add-ons to those systems that the security thing have no idea that they're there. |
1:41.4 | That's Senir Ben Schimall, CEO at Zest Security. The research |
1:46.8 | we're discussing today is titled How We Hacked a Cloud Production Environment by |
1:51.4 | exploiting Terraform providers. |
1:54.0 | So there is very kind of lack of visibility to those type of areas in kind of |
2:08.9 | of depth security realm and while walking with those customers we we kind of decided that |
2:16.2 | this is this is a good opportunity to share our knowledge with the community and kind of |
2:22.0 | make sure that they're all looking into those places. |
2:25.0 | Well, for people who might not be familiar with Terraform, can you give us a little description of what it's used for and the scope of its capabilities? |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.