Securing your cloud with CSPM

As companies begin to move their infrastructure and products to cloud environments, attackers’ interest also increases in them. This, coupled with the rise of new technologies such as Docker or Kubernetes makes it difficult to track the assets belonging to a product or organization.

This generates some dangerous situations that, in addition, are the principal attack vector: We don’t know what we have and

Secdevops @ Telefonica ☕️ Writing about Cloud, Cybersecurity, new technologies and other hobbies 🌴

Love podcasts or audiobooks? Learn on the go with our new app.