Inside an investigation: compromised AWS access keys Hear how we caught an attacker that used a developer’s machine to gain access to AWS. Videos · Cole Finch · TAGS: Cloud security / Incident detection & response / Threat intelligence