on demand

Detecting S3 Breaches with Panther

The challenge of monitoring servers for compromise is increasing as organizations rapidly move infrastructure to the cloud. Universal event logging and granular permissions help, but native cloud services on their own don't offer the functionality security teams need to adequately detect and investigate breaches, and harden cloud infrastructure.

Continuous monitoring in the cloud requires a new approach to security.

In the cloud, object storage is a ubiquitous and necessary service. It powers our digital applications and environments and contains financial data, personally identifiable information (PII), user analytics, and more. In the last several years, attackers have continued to discover vulnerabilities in AWS S3 configurations that compromise user trust and privacy and cost businesses billions of dollars.

In this webinar, we'll walk through strategies to monitor your most sensitive data in S3 using Panther.

Watch this on demand webinar to:

  • Learn practical, defense-in-depth techniques for monitoring and securing your S3 buckets
  • Understand how to model security best practices with code
  • Learn how to detect unauthorized activity to your buckets


Jack Naglieri

Jack Naglieri

Founder, CTO @ Panther Labs

Watch Now

Recommended Resources

Escape Cloud Noise. Detect Security Signal.
Request a Demo