A Muggles Guide To Security In The Cloud

In the security and technology world, we rely so heavily on buzz words to explain our work that others feel like we are magicians working spells that they will never be able to do.

Saying, “Due to issues with our security posture, the APT manipulated a well-known CVE to breach our cloud-native-applications.” Might as well be: “The Death Eaters were able to use a port key to enter our environment and effectively cast the Avada Kedavra spell.”

Instead, we could say, “An attacker used a known flaw to gain access to our environment and brought down our servers.”

In this session, we will come to understand that security for our cloud environments can be simple to understand, yes even for muggles. That is, if we focus on the root cause of all cyber attacks: unauthorized spells, wait, I mean unauthorized code.