Cloud Security público
[search 0]
Más
Download the App!
show episodes
 
Artwork

1
Cloud Security Podcast

Cloud Security Podcast Team

Unsubscribe
Unsubscribe
Mensual+
 
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
  continue reading
 
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
  continue reading
 
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
  continue reading
 
🌟 **Unlock the Power of the Cloud! 🚀** Join us for an exhilarating new season focused on mastering cloud computing and AWS security. This series will cover essential certification topics, provide expert insights, and offer hands-on practices to enhance your skills each week. Whether you are a novice or seeking to deepen your understanding, this program is tailored for you. Season 1 Episodes 1-14: CompTIA Security+ 601 Episodes 15-52: Certified Cloud Security Professional (CCSP) Season 2 Epis ...
  continue reading
 
Welcome to Behind the Binary, the podcast that introduces you to the fascinating people, technology, and tools driving the world of reverse engineering. Join your host, Josh Stroschein, a reverse engineer with the FLARE team at Google, and someone passionate about sharing knowledge and shedding light on the art of reverse engineering, as he sits down with intriguing guests to explore the human side of this profession. Behind the Binary goes beyond the code, sharing the stories, motivations, ...
  continue reading
 
Security on Cloud explores the ups and downs, and ins and outs of cloud security like no other podcast. Hear interviews with industry heavyweights, analysts, and technologists in the cloud security and compliance space. You can receive the insights you need to navigate security and compliance in this new cloud-driven world. Also, hear about high-level trends that face the cloud security industry that you need to be on top of to stay ahead. How to deal with compliance nightmares, how the whol ...
  continue reading
 
Loading …
show series
 
In this episode, we sit down with Sunil Rane, an experienced cybersecurity leader with over 20 years in cybersecurity across industries like healthcare, education, media, and consulting. Sunil shares unique insights into the diverse challenges faced by CISOs, from managing data sensitivity in healthcare to the lack of standardized frameworks in med…
  continue reading
 
Guest host: Marina Kaganovich, Executive Trust Lead, Office of the CISO @ Google Cloud Guest: John Rogers, CISO @ MSCI Topics: Can you briefly walk us through your CISO career path? What are some of the key (cloud or otherwise) trends that CISOs should be keeping an eye on? What is the time frame for them? What are the biggest cloud security challe…
  continue reading
 
🌟 **Unlock the Power of the Cloud! 🚀** Join us for an exhilarating new season focused on mastering cloud computing and AWS security. This series will cover essential certification topics, provide expert insights, and offer hands-on practices to enhance your skills each week. Whether you are a novice or seeking to deepen your understanding, this pro…
  continue reading
 
Episode 65 features Marina Segal, a friend, former colleague, and now co-founder and CEO of her VC-backed start-up, Tamnoon (www.tamnoon.io). I first met and worked with Marina Segal at Dome9 and, subsequently, Check Point Software. Marina is a shrewd and highly experienced executive with a strong background in Security Governance, Risk, and Compli…
  continue reading
 
In this episode, we are joined by Stephen Eckels of the FLARE team at Google (Mandiant). Stephen discusses his journey into the field, starting with his early interest in video game modding and hacking. He shares his experience in discovering the Sunburst backdoor in the SolarWinds attack and emphasizes the importance of continuous learning, commun…
  continue reading
 
Navigating AI Adoption: From Exploration to Implementation In this illuminating episode of Cyber Sentries, John Richards sits down with Jim Wilt, distinguished chief architect at Weave and veteran security practitioner. With decades of experience in emerging technologies since the mainframe era, Jim brings unique insights into how organizations can…
  continue reading
 
In this episode we’re joined by Francis Odum, founder and lead research analyst at Software Analyst Cyber Research. Drawing from his extensive research and conversations with CISOs, security operators, and vendors, Francis shares his insights on the state of identity security and the rise of non-human identities (NHI) in the cloud, why solving the …
  continue reading
 
In this episode, host Ashish Rajan spoke to Mike Privette, founder of Return on Security, to explore the landscape of cybersecurity as we look toward 2025. Mike shared his unique insights on the economics of cybersecurity, breaking down industry trends, and discussing how AI is revolutionizing areas like governance, risk, compliance (GRC), and data…
  continue reading
 
Guest: Bob Blakley, Co-founder and Chief Product Officer of Mimic Topics: Tell us about the ransomware problem - isn't this a bit of old news? Circa 2015, right? What makes ransomware a unique security problem? What's different about ransomware versus other kinds of malware? What do you make of the “RansomOps” take (aka “ransomware is not malware”)…
  continue reading
 
In this episode of the Cloud Security Podcast, host Ashish Rajan speaks to James Berthoty, founder of Latio.Tech and an engineer-driven analyst, for a discussion on cloud security tools. In this episode James breaks down CNAPP and what it really means for engineers, if kubernetes secuity is the new baseline for cloud security and runtime security v…
  continue reading
 
Guest: Allan Liska, CSIRT at Recorded Future, now part of Mastercard Topics: Ransomware has become a pervasive threat. Could you provide us with a brief overview of the current ransomware landscape? It's often said that ransomware is driven by pure profit. Can you remind us of the business model of ransomware gangs, including how they operate, thei…
  continue reading
 
In this episode our host Ashish Rajan sat down with Ross Haleliuk, author of Cybersecurity for Builders and creator of the Venture in Security blog, to explore the current state and future of the cybersecurity industry. From understanding the challenges of building a cybersecurity startup to the dynamics of security engineering and market trends fo…
  continue reading
 
Guest: Andrew Kopcienski, Principal Intelligence Analyst, Google Threat Intelligence Group Questions: You have this new Cybersecurity Forecast 2025 report, what’s up with that? We are getting a bit annoyed about the fear-mongering on “oh, but attackers will use AI.” You are a threat analyst, realistically, how afraid are you of this? The report dis…
  continue reading
 
Happy 2025! In this two-part episode, my guest is the founder of North Labs, Collin Graves. We discuss a variety of topics, including, of all things, the similarities between Higher Education and manufacturing! I'll never think of a 'bow-tie' in the same way again! Collin was an early pioneer in cloud computing and was one of the very first certifi…
  continue reading
 
Happy 2025! In this two-part episode, my guest is the founder of North Labs, Collin Graves. We discuss a variety of topics, including, of all things, the similarities between Higher Education and manufacturing! I'll never think of a 'bow-tie' in the same way again! Collin was an early pioneer in cloud computing and was one of the very first certifi…
  continue reading
 
I am certified as a Certified Cloud Security Professional (CCSP) after clearing the exam by ISC2 on 3rd Dec. In this episode, I shared my experience of the day exam For resources, refer to the show notes at https://technokofe.com/2024/12/26/get-certified-together-episode-52/ Support this podcast at — https://redcircle.com/get-certified-together-com…
  continue reading
 
Guest: Phil Venables, Vice President, Chief Information Security Officer (CISO) @ Google Cloud Topics Why is our industry suddenly obsessed with resilience? Is this ransomware’s doing? How did the PCAST report come to be? Can you share the backstory and how it was created? The PCAST report emphasizes the importance of leading indicators for securit…
  continue reading
 
In another two-part episode, I sit down with a long-time cybersecurity professional and personal friend, Cal Jeffrey. We first met in 1998 when we were both at Check Point Software. We've remained great friends and have collaborated multiple times. I affectionately call him my personal SMEE—subject matter expert on everything! Joking aside, Cal is …
  continue reading
 
In another two-part episode, I sit down with a long-time cybersecurity professional and personal friend, Cal Jeffrey. We first met in 1998 when we were both at Check Point Software. We've remained great friends and have collaborated multiple times. I affectionately call him my personal SMEE—subject matter expert on everything! Joking aside, Cal is …
  continue reading
 
In this episode, Meg Ashby, a senior cloud security engineer shares how her team tackled AWS’s centralized VPC interface endpoints, a design often seen as an anti-pattern. She explains how they turned this unconventional approach into a cost-efficient and scalable solution, all while maintaining granular controls and network visibility. She shares …
  continue reading
 
Part 2 My special guest on episode 62 (in two parts) is a long-time Information Security Executive, entrepreneur, and investor. Todd Beebe cut his teeth in the industry attempting to find his way into other people's systems and networks but turned those skills into a long and successful career bolstering and protecting systems and networks. It was …
  continue reading
 
Part 1 My special guest on episode 62 (in two parts) is a long-time Information Security Executive, entrepreneur, and investor. Todd Beebe cut his teeth in the industry attempting to find his way into other people's systems and networks but turned those skills into a long and successful career bolstering and protecting systems and networks. It was …
  continue reading
 
Guest: Rich Mogull, SVP of Cloud Security at Firemon and CEO at Securosis Topics: Let’s talk about cloud security shared responsibility. How to separate the blame? Is there a good framework for apportioning blame? You've introduced the Cloud Shared Irresponsibilities Model, stating cloud providers will be considered partially responsible for breach…
  continue reading
 
Join us as I sit down with renowned threat hunter, Ryan Chapman. Ryan shares his incredible journey from a curious young hacker to a formidable force in cybersecurity. Discover how his early fascination with software cracking ignited a passion for reverse engineering, ultimately leading him to the front lines of cyber defense. In this conversation,…
  continue reading
 
Bel Lepe Reveals How AI Reduces Security Risks By Removing the Human Element In this episode of Cyber Sentries, host John Richards is joined by Bel Lepe, Co-founder and CEO of Cerby, to explore how removing the human factor through automation can dramatically decrease an organization's attack surface. John and Bel dive into the transformative poten…
  continue reading
 
Guest: Amine Besson, Tech Lead on Detection Engineering, Behemoth Cyberdefence Topics: What is your best advice on detection engineering to organizations who don’t want to engineer anything in security? What is the state of art when it comes to SOC ? Who is doing well? What on Earth is a fusion center? Why classic “tiered SOCs” fall flat when deali…
  continue reading
 
I am certified as a Certified Cloud Security Professional (CCSP) after clearing the exam by ISC2 on 3rd Dec. In this episode, I shared my final sprint, till a day before the exam by sharing books I referred to during this period. For resources, refer to the show notes at https://technokofe.com/2024/12/05/get-certified-together-episode-51/ Support t…
  continue reading
 
In this episode, recorded at Kubecon NA in Salt Lake City, we spoke about about Kubernetes security with Shauli Rozen, co-founder and CEO of ARMO Security. From the challenges of runtime protection to the potential of CADR (Cloud Application Detection and Response), Shauli breaks down the gaps in traditional CSPM tools and how Kubernetes plays a ce…
  continue reading
 
I'm finally back with a new video format. Thanks for sticking with me. I've decided to run solo in this episode and show one of the most popular presentations I've delivered in the last few years. It's not just a bunch of slides; I show a number of very cool sites too! (links below) I hope you enjoy it! (Special thanks to Jason Prost for the initia…
  continue reading
 
Guest: Chris Hoff, Chief Secure Technology Officer at Last Pass Topics: I learned that you have a really cool title that feels very “now” - Chief Secure Technology Officer? What’s the story here? Weirdly, I now feel that every CTO better be a CSTO or quit their job :-) After, ahem, not-so-recent events you had a chance to rebuild a lot of your stac…
  continue reading
 
Guest: Michael Czapinski, Security & Reliability Enthusiast, Google Topics: “How Google protects its production services” paper covers how Google's infrastructure balances several crucial aspects, including security, reliability, development speed, and maintainability. How do you prioritize these competing demands in a real-world setting? What atta…
  continue reading
 
At HashiConf 2024 in Boston, our host Ashish Rajan had a great chat over some cannolis and a game of Jenga with AJ Oller, AVP of Engineering at The Hartford about how automation, mainframes, and compliance intersect to drive innovation in regulated industries like insurance. They spoke about why regulations aren't barriers but frameworks to prevent…
  continue reading
 
In this episode we’re sitting down with Victor Manuel Alvarez, the creator of YARA. YARA is one of the most powerful tools in cybersecurity. We discuss his early career, what motivated him to create YARA, and the role the community has played in its development. Plus, Victor shares his thoughts on the future of YARA and YARA-X, which is a ground-up…
  continue reading
 
Guests: Michele Chubirka, Staff Cloud Security Advocate, Google Cloud Sita Lakshmi Sangameswaran, Senior Developer Relations Engineer, Google Cloud Topics: What is your reaction to “in the cloud you are one IAM mistake away from a breach”? Do you like it or do you hate it? Or do you "it depends" it? :-) Everyone's talking about how "identity is the…
  continue reading
 
Securing the Digital Future with Former Fortune 500 CISO Tim Youngblood John Richards welcomes Timothy Youngblood, a four-time Fortune 500 CISO and current CISO in Residence at Astrix Security, to discuss the evolving landscape of cybersecurity leadership. With experience at Dell, Kimberly Clark, McDonald's, and T-Mobile, Tim brings unique insights…
  continue reading
 
In this episode, Ashish spoke with Kushagra Sharma, Staff Cloud Security Engineer, to delve into the complexities of managing Identity Access Management (IAM) at scale. Drawing on his experiences from Booking.com and other high-scale environments, Kushagra shares insights into scaling IAM across thousands of AWS accounts, creating secure and develo…
  continue reading
 
Guests: Ante Gojsalic, Co-Founder & CTO at SplxAI Topics: What are some of the unique challenges in securing GenAI applications compared to traditional apps? What current attack surfaces are most concerning for GenAI apps, and how do you see these evolving in the future? Do you have your very own list of top 5 GenAI threats? Everybody seem to! What…
  continue reading
 
In this episode, host Ashish Rajan sits down with Prahathess Rengasamy, a cloud security expert with extensive experience at companies like Credit Karma, Block, and Apple. Together, they explore the challenges and best practices for scaling cloud security, especially in the complex scenarios of mergers and acquisitions. Starting with foundational e…
  continue reading
 
Guest: Travis Lanham, Uber Tech Lead (UTL) for Security Operations Engineering, Google Cloud Topics: There’s been a ton of discussion in the wake of the three SIEM week about the future of SIEM-like products. We saw a lot of takes on how this augurs the future of disassembled or decoupled SIEMs. Can you explain what these disassembled SIEMs are all…
  continue reading
 
In this episode, I discussed Understanding the Implications of the Cloud to Enterprise Risk Management, and Understand Outsourcing and Cloud Contract Design. This brings the end of the season for CompTia and CCSP. We will come again in Season 2 of this series, with amazing content. Support this podcast at — https://redcircle.com/get-certified-toget…
  continue reading
 
In this episode, Ashish gets into the critical topic of data perimeters in AWS with our guest, Tyler Warren, a Lead Cloud Security Engineer at USAA. As cloud environments continue to evolve, the importance of securing your data through trusted networks and identities has never been more crucial. Tyler shares his insights on the challenges and strat…
  continue reading
 
Nick Harbour discusses his career journey from his early days in the Air Force to his work at Mandiant. He shares insights into the evolution of malware, his contributions to the field of malware analysis, and the development of the Flare-On contest, a reverse engineering challenge.Por Josh Stroschein
  continue reading
 
Guest: Vijay Ganti, Director of Product Management, Google Cloud Security Topics: What have been the biggest pain points for organizations trying to use threat intelligence (TI)? Why has it been so difficult to convert threat knowledge into effective security measures in the past? In the realm of AI, there's often hype (and people who assume “it’s …
  continue reading
 
In this episode, we sat down with Lukasz Gogolkiewicz, an Australia-based Cybersecurity Leader and former pentester, to explore his journey from offensive security into cybersecurity leadership. Lukasz, also a speaker coach at BlackHat USA, brings valuable insights into what it takes to shift from being technical to managing compliance, governance,…
  continue reading
 
Cross-over hosts: Kaslin Fields, co-host at Kubernetes Podcast Abdel Sghiouar, co-host at Kubernetes Podcast Guest: Michele Chubirka, Cloud Security Advocate, Google Cloud Topics: How would you approach answering the question ”what is more secure, container or a virtual machine (VM)?” Could you elaborate on the real-world implications of this for s…
  continue reading
 
Lars and Kabir Mathur, CEO of Leen, discuss the concept of unified APIs for security data, emphasizing the need for normalization and integration of various security tools. Kabir explains how Leen differentiates itself by not only providing data connectors but also delivering data over an API, making it accessible for developers. They explore the c…
  continue reading
 
What is the future of SOC? In this episode Ashish sat down with Allie Mellen, Principal Analyst at Forrester, to explore the current state of security operations and the evolving role of AI in cybersecurity. Allie spoke about why Cloud Detection Response (CDR) might be dead, how Generative AI is failing to live up to its hype in security use cases,…
  continue reading
 
Guest: Daniel Shechter, Co-Founder and CEO at Miggo Security Topics: Why do we need Application Detection and Response (ADR)? BTW, how do you define it? Isn’t ADR a subset of CDR (for cloud)? What is the key difference that sets ADR apart from traditional EDR and CDR tools? Why can’t I just send my application data - or eBPF traces - to my SIEM and…
  continue reading
 
Open Source AI: Transparency, Sovereignty, and Who Controls the Data In this episode of Cyber Sentries, host John Richards is joined by JJ Asghar, an Open Source Champion and Developer Advocate at IBM. They explore the importance of open source in the AI world, how transparency can allow for AI sovereignty, and why we should care about who controls…
  continue reading
 
In this episode Ashish Rajan sits down with Shashwat Sehgal, co-founder and CEO of P0 Security, to talk about the complexities of cloud identity lifecycle management. Shashwat spoke to us about why traditional identity solutions like SAML are no longer sufficient in today’s cloud environments. He discusses the need for organisations to adopt a more…
  continue reading
 
Loading …

Guia de referencia rapida

Escucha este programa mientras exploras
Reproducir