4 • 1K Ratings
🗓️ 12 January 2025
⏱️ 36 minutes
🧾️ Download transcript
Introducing Dangers of Cloud Misconfigurations from Threat Vector by Palo Alto Networks.
Follow the show: Threat Vector by Palo Alto Networks
In this episode of Threat Vector, host David Moulton speaks with Margaret Kelley, a seasoned Digital Forensics and Incident Response Senior Consultant at Palo Alto Networks’ Unit 42. With a deep expertise in cloud security, Margaret shares insights into the evolving landscape of cloud breaches and how organizations can defend against sophisticated attacks. From misconfigurations to control plane vulnerabilities, the discussion covers the most critical aspects of securing cloud environments. Margaret's real-world examples provide listeners with valuable lessons on how attackers exploit cloud vulnerabilities and what defenders can do to stay ahead. Tune in to learn practical strategies for fortifying your cloud defenses and keeping your organization secure.
Margaret’s most recent articles are Leaked Environment Variables Allow Large-Scale Extortion Operation of Cloud Environments and Bling Libra’s Tactical Evolution: The Threat Actor Group Behind ShinyHunters Ransomware.
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.
The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.
Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.
Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. http://paloaltonetworks.com
DISCLAIMER: Please note, this is an independent podcast episode not affiliated with, endorsed by, or produced in conjunction with the host podcast feed or any of its media entities. The views and opinions expressed in this episode are solely those of the creators and guests. For any concerns, please reach out to [email protected].
Click on a timestamp to play from that location
0:00.0 | You're listening to the Cyberwire Network, powered by N2K. |
0:08.8 | Ready to undermine adversaries and unleashed suck-ups. |
0:12.0 | Join us for Symphony 2025, the ultimate global event designed for security leaders and practitioners who are revolutionizing their sock. |
0:19.2 | Get unparalleled insights from Unit 42, |
0:21.9 | learn from Cortex customers, |
0:23.7 | and see how Cortex is built to conquer today's toughest security threats. |
0:27.7 | Don't miss out on this chance to go from insight to transformation. |
0:31.2 | Level up your security game now. |
0:33.0 | Register at start.paloaltonnetworks.com slash symphony 2025. |
0:42.3 | Thank you. at start.palalto networks.com slash symphony 2025. Margaret, last time we tried this, I had issues with neighbors building incredible bits and pieces of landscaping. |
0:52.5 | I wanted to open today, though, with a quick question. |
0:55.7 | Do you now have a cybersecurity joke that you want to tell our listening audience? |
1:00.0 | Absolutely. |
1:00.9 | How did the hacker get away from the authorities? |
1:04.3 | I don't know. |
1:05.6 | You ransomware. |
1:23.0 | Welcome to Threat Factor, the Palo Alto Networks podcast where we discuss pressing cybersecurity threats and resilience and uncover insights into the latest industry trends. |
1:27.1 | I'm your host, David Moulton, Director of Thought Leadership for Unit 42. |
1:38.9 | In today's episode, we're discussing the complexities of cloud security with a true expert in the field, Margaret Kelly. |
1:44.6 | Margaret is a seasoned digital forensics and incident response, senior consultant Unif 42 Palo Alto Network's elite cybersecurity team. With years of experience as both a cloud |
1:51.0 | engineer and an incident responder, Margaret has a deep understanding of the challenges |
1:55.7 | organizations face in securing their cloud environments. She's also been a speaker at Black Hat and has a passion |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from Rolling Stone | Cumulus Podcast Network, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of Rolling Stone | Cumulus Podcast Network and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.