Organizations around the world kicked off 2018 with fire drills to address the Spectre and Meltdown vulnerabilities. Their widespread impact -- virtually affects all modern high-end microprocessors -- and the risk to public cloud environments in particular garnered them a lot of attention.
Amazon, Microsoft, and Google rushed to patch their operating systems. However, security in the cloud is a shared responsibility and requires that organizations also do their part by identifying vulnerable hosts and implementing mitigations. Unfortunately, standalone on-premise vulnerability management tools cannot be used to achieve this since they were not designed for public cloud architectures.
Join us for this 60-minute webinar to learn how to address the following questions:
- Are any of my hosts in AWS, Azure, or Google Cloud impacted by the Spectre or Meltdown vulnerabilities?
- How do I extend my on-premise vulnerability management tools such as Tenable to be equally relevant in the cloud?
- Which vulnerable hosts have been detected in my cloud environment in the last 7 days, what applications were they running, and did any of them accept suspicious traffic from the internet?
- Which user was responsible for spinning up these hosts and are these hosts still active in my environment?
Robert Berlin, Head of Product Marketing at RedLock
Robert is responsible for content creation, marketing and partner programs. His background includes over 25 years in product management, product marketing and business development in security, networking and cloud computing with Soha Systems, Akamai, Cisco and VCE. He holds a MBA from Pepperdine University.