
Detection Challenges in Cloud Connected Credential Abuse Attacks
Blurring of traditional perimeters with the emergence of cloud has led to rise of new threats. This talk by Rod Soto takes us through some of the attack scenarios and how defenders can implement detection to address these new threats.