Exposing Malware in Linux-Based Multi-Cloud Environments – Chad Skipper, Karen Worstell – ESW #263



90% of cloud runs on Linux, but current countermeasures are focused on addressing Windows-based threats, leaving multi-cloud deployments vulnerable to attacks. So, is it any wonder that malware is propagating in multi-cloud environments under the radar?

Segment Resources:
https://via.vmw.com/exposingmalware

This segment is sponsored by VMware.

Visit https://securityweekly.com/vmware to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes!

Full Episode Show Notes

Exposing Malware in Linux-Based Multi-Cloud Environments

Guests

Chad Skipper

Chad Skipper – Global Security Technologist at VMware

Chad Skipper serves as Global Security Technologist in the Network and Security Business Unit at VMware. With more than 25 years in Information Security, Chad has served in many executive security technologist and strategist roles of endpoint, network, cloud, and hosted security services at Lastline, acquired by VMware, Cylance, acquired by Blackberry, Dell, Cisco, Symantec and is a USAF veteran.

Karen Worstell

Karen Worstell – Sr. Cybersecurity Strategist at VMware

Karen Worstell, Sr. Cybersecurity Strategist and Howler for VMware, is well known today for her work as a CISO for iconic brands such as Russell Investments, Microsoft, and AT&T Wireless. She is one of the pioneer leaders of all aspects of information and internet security serving in research and consulting roles at Boeing Research and Technology, SRI International, NIST, Aerospace Industries Association, US Department of Commerce Computer Systems Security and Privacy Advisory Board, and multiple standards bodies.

As an author and industry luminary, Worstell frequently contributes to various publications and speaks at global industry events on a range of topics including security, innovation, creativity and strategies for improving representation and equity for women in the Tech workforce. She is a contributing author to the 6th ed of the Computer Security Handbook (Wiley), and author of Governance and Control for Cutting Edge IT (ITGI) and Your Amazing Itty Bitty Book on Personal Data Protection (IttyBitty® Books).

Worstell holds Bachelor of Science degrees in Chemistry and Molecular Biology from the University of Washington, and a Master of Science degree in Computer Science from Pacific Lutheran University and an MA in Jewish Studies from MJTI.

Hosts

Adrian Sanabria

Adrian Sanabria – Senior Research Engineer at CyberRisk Alliance

@sawaba

Adrian is an outspoken researcher that doesn’t shy away from uncomfortable truths. He loves to write about the security industry, tell stories, and still sees the glass as half full.

Katie Teitler

Katie Teitler – Sr. Product Marketing Manager at Axonius

@Katherinert15

Katie Teitler is a cybersecurity content creator. In her current role with Axonius, she is part of the product marketing team, helping audiences understand the value proposition of cyber asset management as it pertains to risk reduction. In past roles, Katie was an industry analyst, research director, content marketer, and freelance author, and managed content and speakers for InfoSec World, now a flagship offering of the Cyber Risk Alliance.

Tyler Robinson

Tyler Robinson – Director of Offensive Security & Research at Trimarc Security, Founder & CEO at Dark Element

@tyler_robinson

As the Managing Director of Offensive Security & Research at Trimarc, Tyler leads a team of high-performance security professionals within the offensive security field by simulating sophisticated adversaries and creating scalable offensive security platforms using the latest techniques as seen in the wild. With over 2 decades of experience, Tyler specializes in Red Teaming, APT threat modeling, blackbox network penetration testing, and Physical/Social-Engineering. Tyler has presented at multiple conferences including BSides, DefCon and Blackhat panels, SANS security events and to multiple branches of the military.

Announcements

  • Don’t miss any of your favorite Security Weekly content! Visit https://securityweekly.com/subscribe to subscribe to any of our podcast feeds and have all new episodes downloaded right to your phone! You can also join our mailing list, Discord server, and follow us on social media & our streaming platforms!