CloudVillage

Sort by
Build to Hack, Hack to Build
Phishing in the cloud era
Mining Malevolence: Cryptominers in the Cloud
Using Splunk or ELK for Auditing AWS/GCP/Azure Security posture
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Sentinel using Sysmon and MITRE ATT&CK
Battle in the Clouds - Attacker vs Defender on AWS
Your Blacklist is Dead: Why the Future of Command and Control is the Cloud
Scaling Security in the Cloud With Open Source
Pragmatic Cloud Security Automation
MozDef Workshop slide
Exploiting IAM in the google cloud platform - dani_goland_mohsan_farid
Keynote - Cloudy Vision: How Cloud Integration Complicates Security