{"id":16686,"date":"2015-08-18T17:05:00","date_gmt":"2015-08-18T17:05:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/3418752"},"modified":"2015-08-18T17:05:00","modified_gmt":"2015-08-18T17:05:00","slug":"session-security-built-for-the-cloud-demo-by-alertlogic-cloudexpo-cloud","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/session-security-built-for-the-cloud-demo-by-alertlogic-cloudexpo-cloud\/","title":{"rendered":"[session] &#8216;Security Built for the Cloud&#8217; Demo By @AlertLogic | @CloudExpo #Cloud"},"content":{"rendered":"<p>In their Live Hack\u201d presentation at 17th Cloud Expo, Stephen Coty and Paul Fletcher, Chief Security Evangelists at Alert Logic, will provide the audience with a chance to see a live demonstration of the common tools cyber attackers use to attack cloud and traditional IT systems.<br \/>\nThis \u201cLive Hack\u201d uses open source attack tools that are free and available for download by anybody. Attendees will learn where to find and how to operate these tools for the purpose of testing their own IT infrastructure. They will also witness a cyber-attack from both sides \u2013 attacker and defender. Get an inside view how indicators of compromise are researched to develop security content to be deployed for detection based on these attacks.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/3418752\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In their Live Hack&rdquo; presentation at 17th Cloud Expo, Stephen Coty and Paul Fletcher, Chief Security Evangelists at Alert Logic, will provide the audience with a chance to see a live demonstration of the common tools cyber attackers use to attack cloud and traditional IT systems.<br \/>\nThis &ldquo;Live Hack&rdquo; uses open source attack tools that are free and available for download by anybody. Attendees will learn where to find and how to operate these tools for the purpose of testing their own IT infrastructure. They will also witness a cyber-attack from both sides &ndash; attacker and defender. Get an inside view how indicators of compromise are researched to develop security content to be deployed for detection based on these attacks.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/3418752\" target=\"_blank\">read more<\/a><\/p>\n","protected":false},"author":143,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-16686","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/16686","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/143"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=16686"}],"version-history":[{"count":3,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/16686\/revisions"}],"predecessor-version":[{"id":17091,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/16686\/revisions\/17091"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=16686"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=16686"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=16686"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}