Learn Cloud Security in Public Cloud and for AI systems, the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We are honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud.
We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security.
We STREAM interviews on Cloud Security Topics every week on Linkedin, YouTube and Twitter with over 150K people tuning in.
📻 Siste episoder av Cloud Security Podcast
Her er de nyeste episodene tilgjengelige via RSS-feeden:
Vulnerability Management vs. Exposure Management (00:39:38)
In this episode, Brad Hibbert (COO & Chief Strategy Officer at Brinqa) joins Ashish to explain why traditional risk-based vulnerability management (RBVM) is no longer enough in a cloud-first world .We...
Is Developer Friendly AI Security Possible with MCP & Shadow AI (01:03:02)
Is "developer-friendly" AI security actually possible? In this episode, Bryan Woolgar-O'Neil (CTO & Co-founder of Harmonic Security) joins Ashish to dismantle the traditional "block everything" approa...
Why AI Can't Replace Detection Engineers: Build vs. Buy & The Future of SOC (00:52:08)
Is the AI SOC a reality, or just vendor hype? In this episode, Antoinette Stevens (Principal Security Engineer at Ramp) joins Ashish to dissect the true state of AI in detection engineering.Antoinette...
AI Vulnerability Management: Why You Can't Patch a Neural Network (00:41:20)
Traditional vulnerability management is simple: find the flaw, patch it, and verify the fix. But what happens when the "asset" is a neural network that has learned something ethically wrong? In this e...
Why Backups Aren't Enough & Identity Recovery is Key against Ransomware (00:37:01)
Think your cloud backups will save you from a ransomware attack? Think again. In this episode, Matt Castriotta (Field CTO at Rubrik) explains why the traditional "I have backups" mindset is dangerous....
How to secure your AI Agents: A CISOs Journey (00:54:52)
Transitioning a mature organization from an API-first model to an AI-first model is no small feat. In this episode, Yash Kosaraju, CISO of Sendbird, shares the story of how they pivoted from a traditi...
AI-First Vulnerability Management: Should CISOs Build or Buy? (01:01:30)
Thinking of building your own AI security tool? In this episode, Santiago Castiñeira, CTO of Maze, breaks down the realities of the "Build vs. Buy" debate for AI-first vulnerability management.While b...
SIEM vs. Data Lake: Why We Ditched Traditional Logging? (00:46:53)
In this episode, Cliff Crosland, CEO & co-founder of Scanner.dev, shares his candid journey of trying (and initially failing) to build an in-house security data lake to replace an expensive traditiona...
How to Build Trust in an AI SOC for Regulated Environments (00:42:15)
How do you establish trust in an AI SOC, especially in a regulated environment? Grant Oviatt, Head of SOC at Prophet Security and a former SOC leader at Mandiant and Red Canary, tackles this head-on a...
Threat Modeling the AI Agent: Architecture, Threats & Monitoring (00:47:20)
Are we underestimating how the agentic world is impacting cybersecurity? We spoke to Mohan Kumar, who did production security at Box for a deep dive into the threats of true autonomous AI agents.The c...
AI is already breaking the Silos Between AppSec & CloudSec (01:11:37)
The silos between Application Security and Cloud Security are officially breaking down, and AI is the primary catalyst. In this episode, Tejas Dakve, Senior Manager, Application Security, Bloomberg In...
AI Agents for SOC: Hype Curve vs. Measurable ROI (00:36:21)
Is the AI SOC analyst just hype, or is there measurable ROI? We spoke to Edward Wu, founder of Dropzone AI about this and he shared insights from a recent Cloud Security Alliance (CSA) benchmark repor...
Can You Build an AI SOC with Claude Code? The Reality vs. Hype (00:47:39)
Can you just use Claude Code or another LLM to "vibe code" your way into building an AI SOC? In this episode, Ariful Huq, Co-Founder and Head of Product at Exaforce spoke about the reality being far m...
Incident Response of Kubernetes and how to Automate Containment (00:52:22)
How do you perform incident response on a Kubernetes cluster when you're not even on the same network? In this episode, Damien Burks, Senior Security engineer breaks down the immense challenges of con...
The Truth About AI in the SOC: From Alert Fatigue to Detection Engineering (00:45:39)
"The next five years are gonna be wild." That's the verdict from Forrester Principal Analyst Allie Mellen on the state of Security Operations. This episode dives into the "massive reset" that is trans...
The Security Gaps in AWS Bedrock & Azure AI You Need to Know (00:55:06)
The race to deploy AI is on, but are the cloud platforms we rely on secure by default? This episode features a practical, in-the-weeds discussion with Kyler Middleton, Principal Developer, Internal AI...
The Evolution of Email Security: From Pre-Breach to Post-Breach Protection (00:30:02)
For the last 30 years, email security has been stuck in the past, focusing almost entirely on stopping bad things from getting into the inbox. In this episode, Rajan Kapoor, Field CISO at Material Sec...
Using AI to Fix Your Cloud Security Backlog beyond Visibility (00:48:40)
You have the visibility, you see the alerts, but your security backlog is still growing faster than your team can fix it. So, are you actually getting more secure? In this episode, Snir Ben Shimol, CE...
Your SecOps Team Can't Save Your Cloud: A New Blueprint for Security. (00:47:03)
The conversation around cloud security is maturing beyond simple threat detection. As the industry grapples with alert fatigue, we explore the necessary shift from a reactive to a proactive security p...
New Identity Blueprint for a Future with Cloud & AI (00:49:44)
Identity is the root cause of over 70% of all security incidents, yet many organizations still rely on fundamentally flawed authentication methods. In this episode, Jasson Casey, CEO and co-founder of...
AI for SOC Automation: A Blueprint for the New world of Incident Response (00:52:39)
The nature of Security Operations is changing. As cloud environments grow in complexity and data volumes explode, traditional approaches to detection and response are proving insufficient. This episod...
The Truth About Agentic AI in the SOC: Reality vs. Hype (00:52:39)
What does the integration of AI into a Security Operations Center (SOC) practically look like? This episode explores the concept of the "Agentic SOC," moving beyond marketing terms to discuss its real...
Understanding a $10B Fraud Vector in Cloud-Native Workflows (00:44:42)
A $10 billion fraud vector is currently exploiting a common feature in many cloud-native applications: the SMS verification flow. This isn't a traditional breach. Instead of stealing data, adversaries...
How BT Tackled 180 Years of Legacy to Build a Passwordless Future (00:19:51)
How do you modernize security in a 180-year-old company that operates critical national infrastructure? What does it look like when you discover tens or even hundreds of thousands of credentials hidde...
Why Security Can Be Stricter: A Zero Trust Approach to AppSec with AI (00:45:42)
Is AI making application security easier or harder? We spoke to Amit Chita, Field CTO at Mend.io, the rise of AI agents in the Software Development Lifecycle (SDLC) presents a unique opportunity for s...