Threat hunting in the cloud: defending AWS, Azure and other cloud platforms against cyberattacks
Implement a vendor-neutral and multi-cloud cybersecurity and risk mitigation framework with advice from seasoned threat hunting pros In Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, celebrated cybersecurity professionals and authors Chris Peiris, B...
Gespeichert in:
Beteiligte Personen: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Hoboken, New Jersey
John Wiley & Sons, Inc.
[2022]
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781119804062/?ar |
Zusammenfassung: | Implement a vendor-neutral and multi-cloud cybersecurity and risk mitigation framework with advice from seasoned threat hunting pros In Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, celebrated cybersecurity professionals and authors Chris Peiris, Binil Pillai, and Abbas Kudrati leverage their decades of experience building large scale cyber fusion centers to deliver the ideal threat hunting resource for both business and technical audiences. You'll find insightful analyses of cloud platform security tools and, using the industry leading MITRE ATT&CK framework, discussions of the most common threat vectors. You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services and deliver a multi-cloud strategy for enterprise customers. And you will find out how to create a vendor-neutral environment with rapid disaster recovery capability for maximum risk mitigation. With this book you'll learn: Key business and technical drivers of cybersecurity threat hunting frameworks in today's technological environment Metrics available to assess threat hunting effectiveness regardless of an organization's size How threat hunting works with vendor-specific single cloud security offerings and on multi-cloud implementations A detailed analysis of key threat vectors such as email phishing, ransomware and nation state attacks Comprehensive AWS and Azure "how to" solutions through the lens of MITRE Threat Hunting Framework Tactics, Techniques and Procedures (TTPs) Azure and AWS risk mitigation strategies to combat key TTPs such as privilege escalation, credential theft, lateral movement, defend against command & control systems, and prevent data exfiltration Tools available on both the Azure and AWS cloud platforms which provide automated responses to attacks, and orchestrate preventative measures and recovery strategies Many critical components for successful adoption of multi-cloud threat hunting framework such as Threat Hunting Maturity Model, Zero Trust Computing, Human Elements of Threat Hunting, Integration of Threat Hunting with Security Operation Centers (SOCs) and Cyber Fusion Centers The Future of Threat Hunting with the advances in Artificial Intelligence, Machine Learning, Quantum Computing and the proliferation of IoT devices. Perfect for technical executives (i.e., CTO, CISO), technical managers, architects, system admins and consultants with hands-on responsibility for cloud platforms, Threat Hunting in the Cloud is also an indispensable guide for business executives (i.e., CFO, COO CEO, board members) and managers who need to understand their organization's cybersecurity risk framework and mitigation strategy. |
Beschreibung: | Includes index. - Online resource; title from digital title page (viewed on October 07, 2021) |
Umfang: | 1 Online-Ressource (xxxix, 504 Seiten) illustrations |
ISBN: | 1119804108 9781119804109 9781119804116 1119804116 9781394177493 1394177496 9781119804062 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-076599035 | ||
003 | DE-627-1 | ||
005 | 20240228121430.0 | ||
007 | cr uuu---uuuuu | ||
008 | 220209s2022 xx |||||o 00| ||eng c | ||
020 | |a 1119804108 |c electronic book |9 1-119-80410-8 | ||
020 | |a 9781119804109 |c electronic bk. |9 978-1-119-80410-9 | ||
020 | |a 9781119804116 |c electronic bk. |9 978-1-119-80411-6 | ||
020 | |a 1119804116 |c electronic bk. |9 1-119-80411-6 | ||
020 | |a 9781394177493 |c electronic bk. |9 978-1-394-17749-3 | ||
020 | |a 1394177496 |c electronic bk. |9 1-394-17749-6 | ||
020 | |a 9781119804062 |9 978-1-119-80406-2 | ||
035 | |a (DE-627-1)076599035 | ||
035 | |a (DE-599)KEP076599035 | ||
035 | |a (ORHE)9781119804062 | ||
035 | |a (DE-627-1)076599035 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Peiris, Chris |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Threat hunting in the cloud |b defending AWS, Azure and other cloud platforms against cyberattacks |c Chris Peiris, Binil Pillai, Abbas Kudrati |
264 | 1 | |a Hoboken, New Jersey |b John Wiley & Sons, Inc. |c [2022] | |
300 | |a 1 Online-Ressource (xxxix, 504 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index. - Online resource; title from digital title page (viewed on October 07, 2021) | ||
520 | |a Implement a vendor-neutral and multi-cloud cybersecurity and risk mitigation framework with advice from seasoned threat hunting pros In Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, celebrated cybersecurity professionals and authors Chris Peiris, Binil Pillai, and Abbas Kudrati leverage their decades of experience building large scale cyber fusion centers to deliver the ideal threat hunting resource for both business and technical audiences. You'll find insightful analyses of cloud platform security tools and, using the industry leading MITRE ATT&CK framework, discussions of the most common threat vectors. You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services and deliver a multi-cloud strategy for enterprise customers. And you will find out how to create a vendor-neutral environment with rapid disaster recovery capability for maximum risk mitigation. With this book you'll learn: Key business and technical drivers of cybersecurity threat hunting frameworks in today's technological environment Metrics available to assess threat hunting effectiveness regardless of an organization's size How threat hunting works with vendor-specific single cloud security offerings and on multi-cloud implementations A detailed analysis of key threat vectors such as email phishing, ransomware and nation state attacks Comprehensive AWS and Azure "how to" solutions through the lens of MITRE Threat Hunting Framework Tactics, Techniques and Procedures (TTPs) Azure and AWS risk mitigation strategies to combat key TTPs such as privilege escalation, credential theft, lateral movement, defend against command & control systems, and prevent data exfiltration Tools available on both the Azure and AWS cloud platforms which provide automated responses to attacks, and orchestrate preventative measures and recovery strategies Many critical components for successful adoption of multi-cloud threat hunting framework such as Threat Hunting Maturity Model, Zero Trust Computing, Human Elements of Threat Hunting, Integration of Threat Hunting with Security Operation Centers (SOCs) and Cyber Fusion Centers The Future of Threat Hunting with the advances in Artificial Intelligence, Machine Learning, Quantum Computing and the proliferation of IoT devices. Perfect for technical executives (i.e., CTO, CISO), technical managers, architects, system admins and consultants with hands-on responsibility for cloud platforms, Threat Hunting in the Cloud is also an indispensable guide for business executives (i.e., CFO, COO CEO, board members) and managers who need to understand their organization's cybersecurity risk framework and mitigation strategy. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Internet |x Security measures | |
650 | 0 | |a Cloud computing |x Security measures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Internet ; Sécurité ; Mesures | |
650 | 4 | |a Infonuagique ; Sécurité ; Mesures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Internet ; Security measures | |
700 | 1 | |a Kudrati, Abbas |e VerfasserIn |4 aut | |
700 | 1 | |a Pillai, Binil |e VerfasserIn |4 aut | |
776 | 1 | |z 111980406X | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 111980406X |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781119804062/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-076599035 |
---|---|
_version_ | 1821494824500461568 |
adam_text | |
any_adam_object | |
author | Peiris, Chris Kudrati, Abbas Pillai, Binil |
author_facet | Peiris, Chris Kudrati, Abbas Pillai, Binil |
author_role | aut aut aut |
author_sort | Peiris, Chris |
author_variant | c p cp a k ak b p bp |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)076599035 (DE-599)KEP076599035 (ORHE)9781119804062 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04916cam a22005532 4500</leader><controlfield tag="001">ZDB-30-ORH-076599035</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121430.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">220209s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119804108</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-119-80410-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119804109</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-119-80410-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119804116</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-119-80411-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119804116</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-119-80411-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781394177493</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-394-17749-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1394177496</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-394-17749-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119804062</subfield><subfield code="9">978-1-119-80406-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)076599035</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP076599035</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781119804062</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)076599035</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Peiris, Chris</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Threat hunting in the cloud</subfield><subfield code="b">defending AWS, Azure and other cloud platforms against cyberattacks</subfield><subfield code="c">Chris Peiris, Binil Pillai, Abbas Kudrati</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, New Jersey</subfield><subfield code="b">John Wiley & Sons, Inc.</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxxix, 504 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Online resource; title from digital title page (viewed on October 07, 2021)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Implement a vendor-neutral and multi-cloud cybersecurity and risk mitigation framework with advice from seasoned threat hunting pros In Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, celebrated cybersecurity professionals and authors Chris Peiris, Binil Pillai, and Abbas Kudrati leverage their decades of experience building large scale cyber fusion centers to deliver the ideal threat hunting resource for both business and technical audiences. You'll find insightful analyses of cloud platform security tools and, using the industry leading MITRE ATT&CK framework, discussions of the most common threat vectors. You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services and deliver a multi-cloud strategy for enterprise customers. And you will find out how to create a vendor-neutral environment with rapid disaster recovery capability for maximum risk mitigation. With this book you'll learn: Key business and technical drivers of cybersecurity threat hunting frameworks in today's technological environment Metrics available to assess threat hunting effectiveness regardless of an organization's size How threat hunting works with vendor-specific single cloud security offerings and on multi-cloud implementations A detailed analysis of key threat vectors such as email phishing, ransomware and nation state attacks Comprehensive AWS and Azure "how to" solutions through the lens of MITRE Threat Hunting Framework Tactics, Techniques and Procedures (TTPs) Azure and AWS risk mitigation strategies to combat key TTPs such as privilege escalation, credential theft, lateral movement, defend against command & control systems, and prevent data exfiltration Tools available on both the Azure and AWS cloud platforms which provide automated responses to attacks, and orchestrate preventative measures and recovery strategies Many critical components for successful adoption of multi-cloud threat hunting framework such as Threat Hunting Maturity Model, Zero Trust Computing, Human Elements of Threat Hunting, Integration of Threat Hunting with Security Operation Centers (SOCs) and Cyber Fusion Centers The Future of Threat Hunting with the advances in Artificial Intelligence, Machine Learning, Quantum Computing and the proliferation of IoT devices. Perfect for technical executives (i.e., CTO, CISO), technical managers, architects, system admins and consultants with hands-on responsibility for cloud platforms, Threat Hunting in the Cloud is also an indispensable guide for business executives (i.e., CFO, COO CEO, board members) and managers who need to understand their organization's cybersecurity risk framework and mitigation strategy.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Infonuagique ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kudrati, Abbas</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pillai, Binil</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">111980406X</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">111980406X</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781119804062/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-076599035 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:20:31Z |
institution | BVB |
isbn | 1119804108 9781119804109 9781119804116 1119804116 9781394177493 1394177496 9781119804062 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xxxix, 504 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | John Wiley & Sons, Inc. |
record_format | marc |
spelling | Peiris, Chris VerfasserIn aut Threat hunting in the cloud defending AWS, Azure and other cloud platforms against cyberattacks Chris Peiris, Binil Pillai, Abbas Kudrati Hoboken, New Jersey John Wiley & Sons, Inc. [2022] 1 Online-Ressource (xxxix, 504 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index. - Online resource; title from digital title page (viewed on October 07, 2021) Implement a vendor-neutral and multi-cloud cybersecurity and risk mitigation framework with advice from seasoned threat hunting pros In Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, celebrated cybersecurity professionals and authors Chris Peiris, Binil Pillai, and Abbas Kudrati leverage their decades of experience building large scale cyber fusion centers to deliver the ideal threat hunting resource for both business and technical audiences. You'll find insightful analyses of cloud platform security tools and, using the industry leading MITRE ATT&CK framework, discussions of the most common threat vectors. You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services and deliver a multi-cloud strategy for enterprise customers. And you will find out how to create a vendor-neutral environment with rapid disaster recovery capability for maximum risk mitigation. With this book you'll learn: Key business and technical drivers of cybersecurity threat hunting frameworks in today's technological environment Metrics available to assess threat hunting effectiveness regardless of an organization's size How threat hunting works with vendor-specific single cloud security offerings and on multi-cloud implementations A detailed analysis of key threat vectors such as email phishing, ransomware and nation state attacks Comprehensive AWS and Azure "how to" solutions through the lens of MITRE Threat Hunting Framework Tactics, Techniques and Procedures (TTPs) Azure and AWS risk mitigation strategies to combat key TTPs such as privilege escalation, credential theft, lateral movement, defend against command & control systems, and prevent data exfiltration Tools available on both the Azure and AWS cloud platforms which provide automated responses to attacks, and orchestrate preventative measures and recovery strategies Many critical components for successful adoption of multi-cloud threat hunting framework such as Threat Hunting Maturity Model, Zero Trust Computing, Human Elements of Threat Hunting, Integration of Threat Hunting with Security Operation Centers (SOCs) and Cyber Fusion Centers The Future of Threat Hunting with the advances in Artificial Intelligence, Machine Learning, Quantum Computing and the proliferation of IoT devices. Perfect for technical executives (i.e., CTO, CISO), technical managers, architects, system admins and consultants with hands-on responsibility for cloud platforms, Threat Hunting in the Cloud is also an indispensable guide for business executives (i.e., CFO, COO CEO, board members) and managers who need to understand their organization's cybersecurity risk framework and mitigation strategy. Computer security Internet Security measures Cloud computing Security measures Sécurité informatique Internet ; Sécurité ; Mesures Infonuagique ; Sécurité ; Mesures Internet ; Security measures Kudrati, Abbas VerfasserIn aut Pillai, Binil VerfasserIn aut 111980406X Erscheint auch als Druck-Ausgabe 111980406X |
spellingShingle | Peiris, Chris Kudrati, Abbas Pillai, Binil Threat hunting in the cloud defending AWS, Azure and other cloud platforms against cyberattacks Computer security Internet Security measures Cloud computing Security measures Sécurité informatique Internet ; Sécurité ; Mesures Infonuagique ; Sécurité ; Mesures Internet ; Security measures |
title | Threat hunting in the cloud defending AWS, Azure and other cloud platforms against cyberattacks |
title_auth | Threat hunting in the cloud defending AWS, Azure and other cloud platforms against cyberattacks |
title_exact_search | Threat hunting in the cloud defending AWS, Azure and other cloud platforms against cyberattacks |
title_full | Threat hunting in the cloud defending AWS, Azure and other cloud platforms against cyberattacks Chris Peiris, Binil Pillai, Abbas Kudrati |
title_fullStr | Threat hunting in the cloud defending AWS, Azure and other cloud platforms against cyberattacks Chris Peiris, Binil Pillai, Abbas Kudrati |
title_full_unstemmed | Threat hunting in the cloud defending AWS, Azure and other cloud platforms against cyberattacks Chris Peiris, Binil Pillai, Abbas Kudrati |
title_short | Threat hunting in the cloud |
title_sort | threat hunting in the cloud defending aws azure and other cloud platforms against cyberattacks |
title_sub | defending AWS, Azure and other cloud platforms against cyberattacks |
topic | Computer security Internet Security measures Cloud computing Security measures Sécurité informatique Internet ; Sécurité ; Mesures Infonuagique ; Sécurité ; Mesures Internet ; Security measures |
topic_facet | Computer security Internet Security measures Cloud computing Security measures Sécurité informatique Internet ; Sécurité ; Mesures Infonuagique ; Sécurité ; Mesures Internet ; Security measures |
work_keys_str_mv | AT peirischris threathuntingintheclouddefendingawsazureandothercloudplatformsagainstcyberattacks AT kudratiabbas threathuntingintheclouddefendingawsazureandothercloudplatformsagainstcyberattacks AT pillaibinil threathuntingintheclouddefendingawsazureandothercloudplatformsagainstcyberattacks |