Exposing Malware in Linux-Based Multi-Cloud Environments – Chad Skipper, Karen Worstell – ESW #263
90% of cloud runs on Linux, but current countermeasures are focused on addressing Windows-based threats, leaving multi-cloud deployments vulnerable to attacks. So, is it any wonder that malware is propagating in multi-cloud environments under the radar?
Segment Resources: https://via.vmw.com/exposingmalware
This segment is sponsored by VMware.
Visit https://securityweekly.com/vmware to learn more about them!
Announcements
Don't miss any of your favorite Security Weekly content! Visit https://securityweekly.com/subscribe to subscribe to any of our podcast feeds and have all new episodes downloaded right to your phone! You can also join our mailing list, Discord server, and follow us on social media & our streaming platforms!
Guests
Chad Skipper serves as Global Security Technologist in the Network and Security Business Unit at VMware. With more than 25 years in Information Security, Chad has served in many executive security technologist and strategist roles of endpoint, network, cloud, and hosted security services at Lastline, acquired by VMware, Cylance, acquired by Blackberry, Dell, Cisco, Symantec and is a USAF veteran.
Karen Worstell, Sr. Cybersecurity Strategist and Howler for VMware, is well known today for her work as a CISO for iconic brands such as Russell Investments, Microsoft, and AT&T Wireless. She is one of the pioneer leaders of all aspects of information and internet security serving in research and consulting roles at Boeing Research and Technology, SRI International, NIST, Aerospace Industries Association, US Department of Commerce Computer Systems Security and Privacy Advisory Board, and multiple standards bodies.
As an author and industry luminary, Worstell frequently contributes to various publications and speaks at global industry events on a range of topics including security, innovation, creativity and strategies for improving representation and equity for women in the Tech workforce. She is a contributing author to the 6th ed of the Computer Security Handbook (Wiley), and author of Governance and Control for Cutting Edge IT (ITGI) and Your Amazing Itty Bitty Book on Personal Data Protection (IttyBitty® Books).
Worstell holds Bachelor of Science degrees in Chemistry and Molecular Biology from the University of Washington, and a Master of Science degree in Computer Science from Pacific Lutheran University and an MA in Jewish Studies from MJTI.