Google Cloud Platform1.17 млн
Опубликовано 27 июля 2018, 1:12
Trust is a prerequisite of moving to the cloud. When evaluating a cloud provider, you want to know that it helps keep your information is safe, helps protect you from bad actors, and that you’re in control of your workloads. Trust has to be maintained starting from hardware and firmware, as well as host and guest operating systems. A guest OS can be dynamically compromised by attacking its kernel components via local or remote attack, by local code gaining escalation privileges, or by malicious insiders. Join this session to learn how you can be confident that workloads running on Google Cloud Platform haven’t been penetrated by boot malware or firmware rootkits.
SEC204
Event schedule → g.co/next18
Watch more Security sessions here → bit.ly/2zJTZml
Next ‘18 All Sessions playlist → bit.ly/Allsessions
Subscribe to the Google Cloud channel! → bit.ly/NextSub
re_ty: Publish; product: Cloud - General; fullname: Andrew Honig, Nelly Porter; event: Google Cloud Next 2018;
SEC204
Event schedule → g.co/next18
Watch more Security sessions here → bit.ly/2zJTZml
Next ‘18 All Sessions playlist → bit.ly/Allsessions
Subscribe to the Google Cloud channel! → bit.ly/NextSub
re_ty: Publish; product: Cloud - General; fullname: Andrew Honig, Nelly Porter; event: Google Cloud Next 2018;
Свежие видео
Случайные видео