[On-Demand Webinar] Security Threats Posed by Orphaned Cloud Resources

Orphaned cloud resources, typically left over from development or maintenance, represent significant risks of misconfiguration and data breaches. A long-forgotten EC2 instance or VPC may contain OS vulnerabilities or overly permissive security group rules that hackers can use to gain access to your cloud environments.

In this on-demand webinar, watch as Dave Williams, Cloud Architect at New Light Technologies and Josh Stella, Fugue's CTO and Founder as they will:

  • Explain what orphaned cloud resources are and why they are so pervasive
  • Walk through the ways hackers can exploit orphaned resources to breach data
  • Provide practical steps every cloud team can take to eliminate orphaned resources

Watch this on-demand webinar

I’m seeing a lot of cloud configuration errors in the real world —and it’s scaring the hell out of me.

David Linthicum Chief Cloud Strategy Officer, Deloitte Consulting