4.9 • 696 Ratings
🗓️ 6 May 2020
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Wednesday, May 6th, 2020 edition of the Sands and at Storm Center's |
0:06.9 | Stormcast. My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
0:13.9 | Cloud providers are continuously adding security features to their offering, whether it's |
0:20.3 | AWS or Microsoft, and a couple of readers |
0:24.9 | actually asked whether or not you even still need sort of your own security team, your own |
0:31.4 | security tools, or whether you could just essentially let it all go and have the cloud |
0:37.1 | providers take care of it. |
0:39.8 | So Russ wrote up a quick diary about this topic and, well, the quick summary is, well, |
0:45.3 | not quite. While you definitely should take advantage of whatever features your cloud provider |
0:50.6 | offers and you certainly need to stay in touch with your cloud provider, so you |
0:57.4 | know what the latest offerings are. Often, they're already included in whatever plan you sign up for, |
1:03.4 | but you still need to take care of configuration of your systems, configuration of these security |
1:10.0 | systems. And of course, you also need, configuration of these security systems. |
1:17.1 | And of course, you also need to understand what these security systems are doing for you and what, for example, all the messages and the configuration options mean. |
1:22.9 | So while cloud providers certainly have come quite a away and have realized that users need help |
1:30.1 | with some of the specific cloud challenges, you still need a security program because in the |
1:35.2 | end only you know what your data is worth and how it has to be protected. |
1:41.4 | And then we have a critical update from Citrix for ShareFile storage zone controllers. |
1:47.6 | Apparently, the flaw allows that hacker to gain access to the storage zone controller |
1:54.5 | without authentication and modify the configuration. |
1:59.3 | And of course, in doing so, that hacker would then gain access to |
2:03.2 | users' documents and folders as Citrix states. There are three vulnerabilities being addressed |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.