Cloud Security Podcast

By Cloud Security Podcast Team

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.


Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 60
Reviews: 0
Episodes: 260

Description

Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Facebook and Twitter with over 150 people watching and asking questions and interacting with the Guest.

Episode Date
How is Kubernetes Network Security Evolving?
Apr 30, 2024
The Future of Software Development with AI
Apr 23, 2024
The role of Real Time Defense in Cloud Security
Apr 16, 2024
CISO's guide to embracing risk in business
Apr 09, 2024
Why Email Breaches Still Happen?
Apr 05, 2024
Essential Strategies to master Incident Response in Cloud
Apr 02, 2024
From Code Suggestions to Security
Mar 12, 2024
Cloud Security Operations for Modern Threats
Mar 08, 2024
Understanding Threat Modeling in Cloud
Mar 01, 2024
Balancing Efficiency & Security: AI’s Transformation of Legal Data Analysis
Feb 23, 2024
Sidecar Container Vulnerability in Kubernetes explained
Feb 16, 2024
Role of application security posture management in cybersecurity
Feb 02, 2024
Cybersecurity Best Practices and Password Security in Cloud and AI
Jan 26, 2024
Multicloud strategy for AWS and GCP
Jan 19, 2024
AI's Role in Security Efficiency - Kubernetes Edition
Jan 12, 2024
Build an Effective AWS Cloud Security Program in 2024
Jan 05, 2024
Offensive Cloud Security Program for 2024
Dec 19, 2023
Understand Your Cloud Security Landscape to cut through the noise!
Dec 15, 2023
Kubernetes Security Trends 2024 | Software Supply Chain Security, Zero Trust and AI
Dec 14, 2023
Kubernetes Network Security for Multi Tenancy
Dec 12, 2023
AWS reInvent 2023 - Security highlights and announcements
Dec 05, 2023
eBPF - Kubernetes Network Security without the Blind Sides!
Nov 30, 2023
Attack Path Analysis for Better Kubernetes Security
Nov 22, 2023
Secure your SaaS applications like this!
Nov 21, 2023
Threat Detection for not so Common Cloud Services
Nov 11, 2023
How to Escape Clusters in a Managed Kubernetes Cluster?
Nov 07, 2023
Have I lost my Secrets?
Nov 06, 2023
How to become a Senior Cloud Security Engineer?
Nov 01, 2023
5 Skills to Level Up Your Cloud Hacking
Oct 07, 2023
Become a Cloud Native CISO in 2023
Oct 02, 2023
Software Supply Chain Controls for Terraform
Sep 21, 2023
Data Security RoadMap in 2023
Sep 18, 2023
The Cloud to Code Dilemma - Let's Talk
Sep 09, 2023
CISO Perspective: Josh Lemos, CISO of Gitlab
Sep 06, 2023
The Azure Cloud Security Pentesting Skills You NEED!
Aug 28, 2023
How to detect software supply chain attacks with Honeytokens?
Aug 25, 2023
Google Cloud Security Pentesting Methodology
Aug 24, 2023
Network Pentest 2.0 : The Cloud Pentest Revolution
Aug 22, 2023
Google Cloud Hacking Red Team Perspective!
Aug 02, 2023
Cloud Security in the BoardRoom - CISO Perspective with Phil Venables
Jul 30, 2023
Google Cloud IAP - A Pentester Viewpoint
Jul 26, 2023
Doing Google Cloud Security RIGHT!
Jul 25, 2023
An AWS Centric View of Google Cloud Identity
Jul 22, 2023
So You WANT TO DO Google Cloud Threat Detection - Start here!
Jul 10, 2023
Using Data Perimeters in AWS To Scale Guardrails
Jul 06, 2023
AWS INCIDENT RESPONSE - Automate Containment
Jul 05, 2023
Cloud Security Baseline For Scale
Jul 01, 2023
AWS ReInforce 2023 Recap & Highlights
Jun 23, 2023
Will Application Security Eat Cloud Security for Lunch!
Jun 02, 2023
AI Security - Can LLM be Attacked?
May 30, 2023
What is DevSecOps? DevSecOps with Cloud & AI explained for 2023
May 23, 2023
Evolution of Kubernetes Security | KubeCon EU 2023
May 14, 2023
A DEV FRIENDLY CLOUD NATIVE SECURITY PIPELINE!
May 11, 2023
THEY SCANNED ENTIRE GITHUB FOR SECRETS AND FOUND THIS!
May 09, 2023
Kubernetes Cluster Security Audit Explained
May 03, 2023
Network Security for Kubernetes
Apr 16, 2023
CONTINUOUS KUBERNETES SECURITY IN 2023
Apr 14, 2023
2023 What Kubernetes Security Looks Like Today Series- DevSecOps
Apr 13, 2023
IS THERE DEVSECOPS IN CLOUD? 🤔
Mar 27, 2023
How to Build a Modern Cyber Security Program in 2023
Mar 11, 2023
HOW TO BUILD A CLOUD SECURITY PROGRAM - MEDIA INDUSTRY
Mar 04, 2023
How to Accelerate your AWS Security Maturity in 2023
Feb 25, 2023
How to Build AWS Multi-Account Infrastructure with Security and Speed
Feb 21, 2023
HOW TO GET FEDRAMP CERTIFIED IN AWS CLOUD
Feb 14, 2023
HOW TO BUILD A CLOUD SECURITY PROGRAM WITH CONTAINERS
Feb 05, 2023
AWS Cloud Penetration Testing Explained with Example
Jan 30, 2023
AWS Goat - Cloud Penetration Testing
Jan 24, 2023
Getting Started with Hacking AWS ECS
Jan 12, 2023
GETTING STARTED WITH HACKING AWS CLOUD
Jan 08, 2023
AWS Reinvent 2022 - RECAP for Cloud Security Professionals!
Dec 14, 2022
AWS EKS EXPLAINED!
Dec 10, 2022
Story of a Cloud Architect & Blurry Lines of Control with AWS
Nov 25, 2022
BECOME A CLOUD SECURITY ARCHITECT IN 2023
Nov 13, 2022
AWS Threat Detection for NOT SO COMMON AWS Services Explained
Nov 10, 2022
Ransomware attacks in AWS
Nov 06, 2022
How to become a Cloud Native Security Architect?
Oct 30, 2022
Compliance as Code in Kubernetes
Oct 24, 2022
Software Signing for Kubernetes Supply Chain & Everybody Else
Oct 16, 2022
KUBERNETES BEST PRACTICES 2022
Oct 10, 2022
Building Blocks of a Modern Cloud Security Program
Sep 29, 2022
THIS IS MY Cloud SECURITY ARCHITECTURE - Azure Security Best Practices - Part 2
Sep 25, 2022
SecDataOps Explained - Modern Security Stack
Sep 16, 2022
THIS IS MY Cloud SECURITY ARCHITECTURE - Azure Security Best Practices - Part 1
Sep 12, 2022
Cloud Security Monitoring in a Modern Security Stack
Sep 08, 2022
API SECURITY BEST PRACTICES 2022
Sep 05, 2022
BlackHat Defcon 2022 - The Cloud Security Edition
Aug 28, 2022
HOW TO Threat Model Digital Applications in Cloud
Aug 21, 2022
HOW TO SECURE CONTAINER ENVIRONMENT FOR FINANCIAL SERVICES
Aug 07, 2022
AWS ReInforce 2022 Recap & Highlights
Aug 02, 2022
Fundamentals of AWS Cloud Security Assessment
Jul 30, 2022
So Now You Know!
Jul 28, 2022
HOW TO SECURE AWS CLOUD ENVIRONMENT FOR HEALTHCARE
Jul 20, 2022
Zero Trust and the Triple Paradox
Jul 09, 2022
Building AWS Security Guardrails
Jul 04, 2022
Fix the Broken Digital Supply Chain
Jul 03, 2022
3 THINGS THAT BROKE THE DIGITAL SUPPLY CHAIN
Jun 26, 2022
Digital Transformation - ARE WE THERE YET!
Jun 20, 2022
CISO Perspective: Sean Catlett, CISO of Slack
Jun 14, 2022
CAASM - CyberSecurity Asset Management for the Modern Security Stack
Jun 04, 2022
Azure Security Fundamentals - Level 200
May 29, 2022
Confidential Computing in Azure Explained
May 28, 2022
Azure Cloud Security Architecture
May 25, 2022
Azure Security Fundamentals Level 1
May 19, 2022
Finding Security Holes in Azure Services
May 15, 2022
Azure Kubernetes Service (AKS) Security Explained
May 08, 2022
Azure Security Fundamentals - Zero Trust with Azure AD
May 01, 2022
How to Secure Cloud Managed Kubernetes
Apr 26, 2022
Kubernetes Security Best Practices in 2022
Apr 25, 2022
Manage Privileged Access for Kubernetes & Cloud
Apr 22, 2022
How to become a Cloud Native Security Engineer
Apr 10, 2022
Service Mesh Security EXPLAINED!
Apr 03, 2022
Scaling a Practical AWS Asset Management Program
Mar 27, 2022
Threat Hunting in AWS
Mar 20, 2022
What is SBOM, iBOM?
Mar 13, 2022
Security for AI/ML Models in AWS
Mar 06, 2022
Building Google Cloud Security Products
Mar 03, 2022
Google Cloud Security Fundamentals - Level 2
Feb 27, 2022
Google Cloud Security Fundamentals
Feb 20, 2022
Red Team in Google Cloud
Feb 13, 2022
How to Automate Security in Google Cloud?
Feb 06, 2022
Authorization Control for Enterprise in Cloud
Jan 30, 2022
McFee and FireEye join forces for XDR
Jan 26, 2022
AWS IAM Getting Started
Jan 23, 2022
Remote Access Trojans target Public Cloud Infrastructure
Jan 19, 2022
Secret Management for Modern Apps Explained
Jan 16, 2022
CISO in a Cloud World in 2022 - Stu Hirst
Jan 12, 2022
UK Financial Regulators monitoring Cloud Providers Closely
Jan 12, 2022
Building Modern Identity (IAM) Roadmap for Cloud
Jan 09, 2022
Google invests in Security + Microsoft's Log4Shell Update
Jan 05, 2022
Building Scalable Authorization in Cloud Native Apps
Jan 02, 2022
The Latest with Log4J
Dec 22, 2021
Log4j - How the Cloud Providers responded!
Dec 15, 2021
AWS Outage - What is impacted?
Dec 08, 2021
AWS re:Invent 2021 - All the Cloud Security Updates so far
Dec 02, 2021
Palo Alto Investors told: "18- 24 months ahead" of competition
Nov 24, 2021
Breaking and Building Serverless Application Security
Nov 21, 2021
Feds go "Cloud Smart"+ Alibaba Cloud targeted by Hackers
Nov 17, 2021
Challenges with Building Serverless Applications at Scale
Nov 14, 2021
Microsoft releases CSPM for AWS & More Linux Security Support on Azure
Nov 10, 2021
Security Governance and Compliance in Serverless Applications
Nov 07, 2021
AWS Earns over 16billion this quarter + SEGA on Microsoft Azure - Cloud Security News
Nov 03, 2021
How to Build Applications with Zero Trust Principles
Oct 31, 2021
What is SaaS Security Posture Management (SSPM)?
Oct 28, 2021
AWS Lands UK Spy Services Contact + Google Cloud + Azure release Q3 results - Cloud Security News
Oct 27, 2021
Threat Detection and Incident Response in Cloud - Nathan Case
Oct 24, 2021
HashiConf Global 2021 - Our Cloud Security Picks - Cloud Security News
Oct 22, 2021
Talks not to be missed at Kubecon North America 2021 - Cloud Security News
Oct 21, 2021
All the Security Updates - Google Cloud Next 21 - Cloud Security News
Oct 20, 2021
What is Cloud Native Application Protection Platform - CNAPP Explained!
Oct 17, 2021
Google Cloud Next 21, Kubecon and VMworld - Cloud Security News
Oct 13, 2021
Implementing Cloud Security Tools the Right way - Stay Alert Not Fatigue!
Oct 10, 2021
AWS Launches Cloud Control API - Cloud Security News
Oct 06, 2021
Data Security in Cloud with David McCaw, Dasera
Oct 03, 2021
Cloud Security ranks in 2021 OWASP Top 10 - Cloud Security News
Sep 29, 2021
Cloud Security Careers: Application Security Engineer Skills with Tanya Janca
Sep 26, 2021
Cloud Security Careers: Threat Analyst Skills
Sep 24, 2021
Vulnerabilities in AWS, GCP and Azure - Cloud Security News
Sep 22, 2021
Cloud Security Careers: From University to Security Engineer at Atlassian
Sep 19, 2021
Cloud Security Careers: Getting an Entry Level GRC Role
Sep 15, 2021
fwd:cloudsec conference this week, Vulnerabilities discovered in AWS - Cloud Security News
Sep 15, 2021
Cloud Security Careers: From Executive Assistant to Head of Security
Sep 12, 2021
IBM Launches Servers for Hybrid Cloud, Microsoft and Verizon bring 5G Edge Cloud Computing - Cloud Security News
Sep 08, 2021
Cloud Security Careers: Skills Required for an Associate Cloud Security Engineer
Sep 05, 2021
Is your Microsoft Azure Cosmos Database Keys Secure? - Cloud Security News
Sep 01, 2021
Cloud Hacking eSports | Ultimate Hacking Championship
Aug 29, 2021
Network Security in a Cloud Native World
Aug 26, 2021
AWS Re:inforce goes Virtual - Cloud Security News
Aug 25, 2021
THINKING OF MOVING A MONOLITH TO CLOUD NATIVE?
Aug 22, 2021
DO WE NEED LOGGING? - Building Observability Platform for Scale - Atlassian
Aug 15, 2021
What is a SECURITY DATA LAKE?
Aug 08, 2021
Security Logging is Changing | Observability & Tracing Explained
Aug 01, 2021
WHAT IS CYBER RESILIENCY IN CLOUD?
Jul 25, 2021
AWS Security - Managing Threat Detection and Response
Jul 21, 2021
Cloud Security RoadMap - Scott Piper
Jul 18, 2021
Comparing Cloud Security Tools - CWPP, CSPM, CASB & CNAPP
Jul 11, 2021
Cloud Infrastructure Security at Scale - Netflix
Jul 04, 2021
Hacker Valley Studio - ExIST Framework to reach Peak Performance in CyberSecurity
Jun 27, 2021
Finding Security Bugs in Google Cloud - Kat Traxler
Jun 20, 2021
Hacker stories from the Internet - Darknet Diaries
Jun 13, 2021
CSO Hall of Fame - 21 yrs in Cybersecurity: Challenges THEN & NOW
Jun 10, 2021
Finding and Fixing SECURITY BUGS IN GOOGLE CLOUD - Dylan Ayrey
Jun 06, 2021
Attacking and Defending Managed Kubernetes Clusters - Brad Geesaman
May 30, 2021
Kubernetes Runtime Threat Detection and Response - Falco, Sysdig
May 23, 2021
Study Hall - Attacking K8S Cluster Defaults!
May 20, 2021
Start here for Kubernetes Security - Magno Logan
May 16, 2021
Study Hall - Kubernetes Concepts and Architecture Explained!
May 12, 2021
Risk Analysis of Kubernetes Security - Mark Manning, Snowflake
May 09, 2021
Study Hall - What is Kubernetes & Why do you NEED TO know about it?
May 05, 2021
Kubernetes (Goat) Vulnerable by Design - Madhu Akula
May 02, 2021
CISO PERSPECTIVE SERIES: LINKEDIN CISO - Geoff Belknap
Apr 27, 2021
Study Hall: Honest truth behind learning Kubernetes
Apr 27, 2021
Building Threat Detection for your Cloud Environment
Apr 18, 2021
Cloud Governance using Infrastructure as Code (IaC)
Apr 11, 2021
Kubernetes Security Explained for those starting today! - Kelsey Hightower
Apr 04, 2021
Getting Infrastructure as Code (IaC) Security Culture right! - Yoni Leitersdorf
Mar 28, 2021
Azure Security Best Practices for Cloud Architects - John Savill
Mar 21, 2021
WHAT IS INFRASTRUCTURE AS CODE SECURITY? - Barak Schoster
Mar 14, 2021
INCIDENT RESPONSE IN AWS CLOUD
Mar 07, 2021
How to become a CLOUD SECURITY ENGINEER IN 2021?
Feb 28, 2021
Kubernetes Security at Scale in A CI/CD Pipeline - Michael Fraser
Feb 21, 2021
Container Security in AWS at Scale - Ben Tomhave
Feb 14, 2021
CISO Challenges in 2021 - Zane Lackey Signal Sciences, Fastly
Feb 10, 2021
Cloud Security in $25 Billion dollar Company - Siemens USA
Feb 07, 2021
Security Chaos Engineering Experiments for Beginners
Jan 31, 2021
RED TEAM IN CLOUD - Brianna Malcolmson, Atlassian
Jan 24, 2021
INFRASTRUCTURE AS CODE SECURITY
Jan 17, 2021
Cloud Security Testing in AWS
Jan 10, 2021
HOW TO BECOME A CLOUD SECURITY ARCHITECT in 2021 ? - Sriya Potham
Jan 03, 2021
STARTING A SUCCESSFUL CYBERSECURITY PODCAST IN 2021
Dec 20, 2020
RISK MANAGEMENT IN CLOUD SECURITY - MONICA VERMA
Nov 29, 2020
WHAT IS DIGITAL RISK PROTECTION & WHY IS IT IMPORTANT? - Sam Small, Zerofox
Nov 22, 2020
OPEN SOURCE AWS SECURITY - MATTHEW FULLER, co-Founder CloudSploit, Aqua
Nov 15, 2020
WHAT THE HECK IS CI/CD | Continuous Integration | Delivery | Deployment - Melissa Benua
Nov 08, 2020
HOW TO PREPARE FOR GDPR IN AZURE CLOUD ENVIRONMENT- Naomi Buckwalter
Nov 01, 2020
HOW TO START in BUG BOUNTY IN 2020 with Casey Ellis, BugCrowd
Oct 25, 2020
CONTINUOUS MONITORING FOR CONTROLS & VULNERABILITIES - DANIEL MIESSLER
Oct 18, 2020
AWS SECURITY IN A LARGE REGULATED ENTERPRISE! - HOUSTON HOPKINS, CAPITAL ONE
Oct 11, 2020
CISO Challenges in Cloud Security - Caleb Sima, VP - Security at Databricks
Oct 04, 2020
WHAT IS SECURITY CHAOS ENGINEERING? - JEROME WALTER, SECURITY MODERNISATION
Sep 27, 2020
Security and Compliance in AWS Cloud
Sep 20, 2020
Identity & Cross Account Access Management in AWS | CLOUD SECURITY - Alexandre Sieira
Sep 13, 2020
WHAT IS AZURE IDENTITY MANAGEMENT | CLOUD SECURITY
Sep 06, 2020
CLOUD SECURITY POSTURE MANAGEMENT - CSPM - GAURAV KUMAR
Aug 30, 2020
HOW TO BUILD SECURE ENVIRONMENTS IN Google Cloud - DARPAN SHAH
Aug 23, 2020
HOW TO BUILD SECURE ENVIRONMENTS IN MICROSOFT AZURE - NICHOLAS HUGHES
Aug 16, 2020
HOW TO CREATE AN EFFECTIVE CYBER SECURITY TEAM - CLINT GIBLER
Aug 09, 2020
Application Security AppSec 101 - Tanya Janca
Aug 02, 2020
Getting Started with Chaos Engineering - What is it and how can it be used to build Application resiliency? - Aaron Rinehart, Verica
Aug 02, 2020
Cloud Security in Operational Technology vs Information Technology world - Parul Kharub, CISSP
Jul 19, 2020
HOW TO BECOME A SUCCESSFUL CISO IN 2020 - Abbas Kudrati, Microsoft
Jul 12, 2020
How to do Google Cloud Security Well - The 2020 Edition - Darpan Shah
Jul 05, 2020
HOW TO BECOME A CLOUD SECURITY ENGINEER in 2020 | Including Top Certifications
Jun 28, 2020
Building an Engineering Security Culture - Failure stories included - Edwin Kwan, Tyro Payments
Jun 21, 2020
TIPS FOR WOMEN IN INFORMATION SECURITY TO GET A JOB IN CYBER SECURITY - Alannah Goh, 0xCC
Jun 14, 2020
Google Cloud Security - How does Google Cloud work?
Jun 07, 2020
What is GOOD COMPANY CULTURE (WITH EXAMPLE ) during COVID19 with remote employees!
May 31, 2020
What is a Connected Car | How to secure api in connected cars? - Virtual Coffee with Ashish - Alissa Knight
May 24, 2020
What is SRE? When should i have SRE? - Virtual Coffee with Ashish - Tim Heckman
May 17, 2020
NIST CyberSecurity Metrics for the Board - Taylor Hersom
May 10, 2020
Virtual Coffee with Ashish - Cloud Security Podcast & Hacker Valley Studio
May 03, 2020
Scaling a DevSecOps model | SERVERLESS SECURITY BEST PRACTICES with Abhay Bhargav , CTO , we45
Apr 26, 2020
CORONAVIRUS & CYBERSECURITY | ISOLATION LIFE
Apr 19, 2020
How to secure and improve cloud environment - Merritt Baer, Principal Security Architect, AWS
Apr 11, 2020
Cloud Center of Excellence in AWS | How Atlassian manages Risk and Compliance - Atlassian 2020
Apr 05, 2020
A TECHNICAL WOMEN DELIVERING NON-TECHNICAL TRAINING IN CYBERSECURITY | HOW TO BUILD CYBERSECURITY TRAINING PROGRAM- Fareedah Shaheed, Online Safety and Security Strategist, Sekuva
Mar 29, 2020
How HASHICORP works with 90 percent Staff works Remotely | Incident Response | AWS Cloud Native! - Will Bengtson
Mar 22, 2020
Multi Cloud Strategy | Multi Cloud Management for companies of all size - David Linthicum , Chief Cloud Strategy Officer for Delloite
Mar 15, 2020
CCPA COMPLIANCE | CALIFORNIA CONSUMER PRIVACY ACT | DATA GOVERNANCE BEST PRACTICES - TAYLOR HERSOM, VCISO, AUSTIN,TEXAS
Mar 08, 2020
Docker Security Best practice | Container Security 101 in AWS - Michael Hausenblas, Product Developer Advocate, AWS
Mar 01, 2020
Threat Intelligence platform for cyber security in Azure | Incident Response in Azure - Ashwin Patil, Threat Intelligence Center, Microsoft
Mar 01, 2020
MICROSOFT IGNITE 2020 SYDNEY | Getting started with securing Microsoft Azure Workload- David O'Brien, Microsoft MVP for Azure
Feb 16, 2020
Is public cloud secure? - Francesco Cipollone, Cloud Security Alliance
Feb 09, 2020
Just Eat UK security - cloud security across Scotland uk canada in a world of multi public cloud
Feb 02, 2020
Cloud Security in Japan - Cloud Security Podcast the Tokyo edition
Jan 26, 2020
AZURE vs AWS , Azure Security and Can AZURE be DevOps friendly? - Tanya Janca
Jan 19, 2020
CLOUD SECURITY JOURNEY OF DOW JONES POST THE AWS CLOUD BREACH , WITH JAY KELATH, PRODUCT SECURITY
Jan 12, 2020
Networking , recruiting and retaining female engineers, cyber security influencer, personal branding, mentoring for introvert men and women in cyber Security with Jane Frankland
Jan 05, 2020
Cloud Security and Infosec girls with Vandana Verma
Dec 23, 2019
AWS Re-invent 2019 Security Announcements - The DevSecOps in AWS edition
Dec 22, 2019
Cloud Security Podcast - Trailer
Nov 28, 2019