Artwork

Content provided by Eric Kavanagh. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Eric Kavanagh or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Secret Machines: Who or What Can Access Your Data?

44:07
 
Share
 

Manage episode 414630735 series 3559948
Content provided by Eric Kavanagh. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Eric Kavanagh or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Deploying into the cloud can be a game changer for your organization's level of efficiency. But how can you ensure your sensitive information is safe, not just from fellow human beings, but also the machines that have access to your infrastructure? In this episode of Inside Analysis, Brendan Hannigan of Sonrai Security dives into the permissions that non-human entities such as applications, bots and scripts might hold within your cloud environment. How can you reliably shut down unwanted access to your data? And on the flip side, how can you distribute permissions easily to those who belong? Tune into Inside Analysis to find out!
  continue reading

288 episodes

Artwork
iconShare
 
Manage episode 414630735 series 3559948
Content provided by Eric Kavanagh. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Eric Kavanagh or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Deploying into the cloud can be a game changer for your organization's level of efficiency. But how can you ensure your sensitive information is safe, not just from fellow human beings, but also the machines that have access to your infrastructure? In this episode of Inside Analysis, Brendan Hannigan of Sonrai Security dives into the permissions that non-human entities such as applications, bots and scripts might hold within your cloud environment. How can you reliably shut down unwanted access to your data? And on the flip side, how can you distribute permissions easily to those who belong? Tune into Inside Analysis to find out!
  continue reading

288 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide