November 06, 2018 By BlueAlly
Security Researcher Will Bengtson Appears on Ipswitch “Defrag This” Podcast to Discuss How to Approach Monitoring Security in the Cloud
BURLINGTON, Mass. – Nov. 6, 2018 – Ipswitch®, producer of award-winning and easy-to-use secure file transfer and network management software, hosted guest Will Bengtson on episode 35 of Defrag This, Ipswitch’s podcast for IT professionals that features meaningful trends, commentary on breaking news and more, available from multiple channels. Creator and host of Defrag This, Greg Mooney, tackled the topic, “Monitoring Security in AWS,” with Bengtson, Senior Security Engineer at Netflix, who has over a decade of experience in cybersecurity.
What: Defrag This – Episode 35: Monitoring Security in AWS with Guest Will Bengtson
Where: https://blog.ipswitch.com/defrag-this-monitoring-security-in-aws
At Netflix, Bengtson is focused on security operations and tooling. Previously, he led security at a healthcare data analytics startup, consulted across various industries in the private sector, and spent many years in the Department of Defense. Bengtson contributes to numerous open source projects and has spoken on security across the world.
This episode expands on the show’s recent topic about security and the attack vectors surrounding the cloud at the API level, exploring the different attack vectors in AWS. While AWS is the most popular cloud service, the approach is the same when it comes to Azure, Google Cloud, or any other cloud service. Bengtson addresses how you can approach monitoring security in the cloud, including the use of various tools – IAM or AWS Identity Management and CloudTrail, and how these tools are helping him to manage and monitor the threat landscape in the cloud. He also addresses authorized and unauthorized access and what constitutes a suspicious IP.
“Most IT professionals have many end users accessing cloud services and virtual machines on a daily basis,” said Mooney, Sr. Content Manager at Ipswitch. “Depending on the amount of activity, it can be difficult to determine which IPs accessing your business’ cloud are legit or illicit. Your cloud provider also isn’t going to hold your hand when it comes to monitoring security in the cloud, so much of the legwork is done by you, the IT team. Tune in to this latest episode to learn more.”