Discussion, innovation, and collaboration: RSA and Purple Cloud Summit Event Recap 2022
During RSA, Lightspin was proud to present our Purple Cloud Summit, bringing together an array of builders and leaders from the cloud security field.
Roy Maor leads Lightspin’s algorithm team. Prior to joining Lightspin, Roy worked as an Algorithm Engineer in RAFAEL’s mobile network research team and headed a geospatial BI team in the IDF’s Intelligence Unit 9900. In his spare time, Roy likes to find critical attack paths in cloud environments and explore his fields of interest ranging from graph theory to computer vision. Roy holds a Computer Engineering B.Sc. degree from the Technion.
During RSA, Lightspin was proud to present our Purple Cloud Summit, bringing together an array of builders and leaders from the cloud security field.
We've compiled the most comprehensive and officially unofficial list of functions around the RSA week.
Take a look at Lightspin's examination of GCP's storage service, how to access buckets, and how to make sure your buckets are configured as intended.
You are cordially invited to join Lightspin at the Purple Cloud Summit & Lounge at the Contemporary Jewish Museum in San Francisco on June 8th during RSA.
Lightspin obtains credentials to an internal AWS service by exploiting a local file read vulnerability on the RDS EC2 instance using the log_fdw extension.
With Recon.Cloud, a public and free AWS cloud security reconnaissance tool, users can reveal publicly exposed cloud assets on any domain.
Lightspin reveals several ways an attacker could potentially access your sensitive data using Redshift COPY command.
Lightspin is giving away 25 one-year subscriptions to A Cloud Guru, a $420 value.
The fourth and final entry of the Microsoft Defender for Endpoint on AWS series by Jonathan Rau, CISO at Lightspin.
Learn all about how to accomplish automated security analysis for your IaC templates using the new Lightspin IaC Orb inside the CircleCI platform.
Get an in-depth look at the implementation and use of graph theory in the context of cloud security.
An introduction to graph theory in cloud risk management, reducing cyber security risks through a science-driven approach to connected cloud data.
Leverage predictive attack path analysis and keep attackers out of your environment
Get an in-depth look at the implementation and use of graph theory in the context of cloud security.
An introduction to graph theory in cloud risk management, reducing cyber security risks through a science-driven approach to connected cloud data.
© 2022 Lightspin