Top 3 access risks in cloud security
Channel | Publish Date | Thumbnail & View Count | Download Video |
---|---|---|---|
Publish Date not found | 0 Views |
Welcome to the second episode of Cloud Security Basics where Carter Morgan explains the different ways an entity can gain access to your systems. In this episode he talks about the common strategies used to gain access such as: man-in-the-middle, DDoS exploits, and phishing. In addition, he talks about what tools Google Cloud offers to protect its users from these attacks such as: universal two-factor authentication, encrypted traffic and load balancing, and cloud identity proxies.
Watch more episodes of Cloud Security Basics https://goo.gle/2UAI69x
Subscribe to get all episodes as they come out: https://goo.gle/GoogleCloudTech
Product: Cloud Identity-Aware Proxy, Cloud Phishing Protection; Full name: Carter Morgan;
#CloudSecurityBasics
Please take the opportunity to connect with your friends and family and share this video with them if you find it useful.