In the legacy infrastructure world, dwell time for bad
actors is often measured in weeks or months.
Bad actors in the cloud don’t have that luxury. That access
token they’ve acquired likely without your knowledge often expires in minutes. They’ve
come prepared to sprint with automated attacks ready to go.
The cloud so far has primarily been an automation race run
by one side. The wrong side. Organizations will either invest to catch up or
perish before they can respond.
Follow me on Twitter for the latest blog updates: @Opinionatedsec1
SEE ALSO
No comments:
Post a Comment