Cloud Security Podcast

@CloudSecurityPodcast - 877 本の動画

チャンネル登録者数 2.28万人

Cloud Security Podcast is a community first WEEKLY VIDEO PODCAST, where each week we interview CyberSecurity Leaders and Cloud Security Practitioners from ar...

最近の動画

Cloud Security Evolved: From CNAPP to AI Threats ft. Elad Koren (Palo Alto Networks) 19:17

Cloud Security Evolved: From CNAPP to AI Threats ft. Elad Koren (Palo Alto Networks)

MORE Fake Code Than Real? AI Supply Chain Security Explained 20:20

MORE Fake Code Than Real? AI Supply Chain Security Explained

RSA 2025 Recap: Top Themes,  Actionable Insights & Future Trends 58:00

RSA 2025 Recap: Top Themes, Actionable Insights & Future Trends

What REALLY Happens at RSA Conference? 0:16

What REALLY Happens at RSA Conference?

RSA Conference - Can Access Management Stop Hackers in 2025? 0:54

RSA Conference - Can Access Management Stop Hackers in 2025?

What Really Happens at RSA Conference Day 1 and 2? 0:43

What Really Happens at RSA Conference Day 1 and 2?

RSA Conference 2025 - How AI Helps and Hurts Cybersecurity! 0:54

RSA Conference 2025 - How AI Helps and Hurts Cybersecurity!

RSA Conference 2025 - Top 5 CyberSecurity Expected Trends 2:02

RSA Conference 2025 - Top 5 CyberSecurity Expected Trends

Mindset: Modern SOC Strategies for Cloud & Kubernetes (Ft Sergej Epp. Ex-Deutsche Bank) 35:02

Mindset: Modern SOC Strategies for Cloud & Kubernetes (Ft Sergej Epp. Ex-Deutsche Bank)

Planning for a Cloud Pentest 0:59

Planning for a Cloud Pentest

Scaling Container Security Without Slowing Developers (ft. Cailyn Edwards, SIG Security) 28:14

Scaling Container Security Without Slowing Developers (ft. Cailyn Edwards, SIG Security)

What is Detection as Code 0:58

What is Detection as Code

Developers EXPOSE Their WORST CYBER SECURITY Mistakes 1:47

Developers EXPOSE Their WORST CYBER SECURITY Mistakes

How Attackers Stay Hidden Inside Your Azure Cloud 35:29

How Attackers Stay Hidden Inside Your Azure Cloud

Whats different about the AI Security Landscape 1:01

Whats different about the AI Security Landscape

I Became the NEW CISO 0:57

I Became the NEW CISO

I Spent 3 Days At Kubecon EU 2025 And here are the Best Parts @cncf 0:20

I Spent 3 Days At Kubecon EU 2025 And here are the Best Parts @cncf

How Confluent Migrated Kubernetes Networking Across AWS, Azure & GCP 15:33

How Confluent Migrated Kubernetes Networking Across AWS, Azure & GCP

How is Cloud Incident Response different? 0:54

How is Cloud Incident Response different?

Best Approach for Threat Detection And Response In Cloud Security 0:36

Best Approach for Threat Detection And Response In Cloud Security

What kind of Access in the Cloud is enough for Incident Response Teams? 0:59

What kind of Access in the Cloud is enough for Incident Response Teams?

CISO Roadmaps for 2024 0:57

CISO Roadmaps for 2024

What is Threat Detection and Response in SOC 0:59

What is Threat Detection and Response in SOC

Best Practice for Threat Detection and Response in Multicloud 0:59

Best Practice for Threat Detection and Response in Multicloud

Getting Started with Threat Detection in Cloud 0:59

Getting Started with Threat Detection in Cloud

How to Get Buy in for Cybersecurity from Upper Management Support 0:57

How to Get Buy in for Cybersecurity from Upper Management Support

Can CSPM help with Incident Response 0:57

Can CSPM help with Incident Response

How Cloud Logs Improve Incident Response Strategies 0:47

How Cloud Logs Improve Incident Response Strategies

What it means to be a CISO 0:57

What it means to be a CISO

Google's largest acquisition 0:37

Google's largest acquisition

Detection Engineering with Google Cloud 42:32

Detection Engineering with Google Cloud

The "Wiz-Ardry of Google" Panel 59:30

The "Wiz-Ardry of Google" Panel

CNAPPs & CSPMs don’t tell the full cloud security story 49:24

CNAPPs & CSPMs don’t tell the full cloud security story

Securing AI Applications in the Cloud 45:28

Securing AI Applications in the Cloud

Realities of Cloud Networking in AWS 53:06

Realities of Cloud Networking in AWS

Will CNAPP Become The Cloud Security Hero We Have Been Waiting For? 0:26

Will CNAPP Become The Cloud Security Hero We Have Been Waiting For?

Cloud Incident Response in Microsoft Azure 54:16

Cloud Incident Response in Microsoft Azure

Any Cloud Security People  in Estonia 🇪🇪? 0:18

Any Cloud Security People in Estonia 🇪🇪?

AWS Multi-Account Security: What Netflix Learned 50:34

AWS Multi-Account Security: What Netflix Learned

We will be at @Disobey this week! - Our Nordic Tour Starts 0:30

We will be at @Disobey this week! - Our Nordic Tour Starts

How does Attack Surface Management fit into Proactive Security? 1:01

How does Attack Surface Management fit into Proactive Security?

Identity in Cybersecurity in 2025 1:00

Identity in Cybersecurity in 2025

Cloud Security Detection & Response Strategies That Actually Work 57:59

Cloud Security Detection & Response Strategies That Actually Work

SOC Automation in 2025 0:46

SOC Automation in 2025

What is Proactive Security? 0:59

What is Proactive Security?

How is DSPM Different to DLP? 1:02

How is DSPM Different to DLP?

Is the cybersecurity industry doing well? 0:49

Is the cybersecurity industry doing well?

Proactive vs. Reactive Security in Microsoft Azure 26:29

Proactive vs. Reactive Security in Microsoft Azure

Is your data secure enough for AI? 1:00

Is your data secure enough for AI?

What are the top Cybersecurity Trends in 2025? 1:01

What are the top Cybersecurity Trends in 2025?

CISO Challenges Across Industries 31:39

CISO Challenges Across Industries

Why Solving the Data Problem is Key to Cloud Security? 50:34

Why Solving the Data Problem is Key to Cloud Security?

The economics of cybersecurity and trends 26:04

The economics of cybersecurity and trends

What is Cloud Security in 2025? 1:01

What is Cloud Security in 2025?

Cloud security tool consolidation? 1:01

Cloud security tool consolidation?

Platformization of Cybersecurity Tools 1:10

Platformization of Cybersecurity Tools

Is Kubernetes the new Default for applications? 0:57

Is Kubernetes the new Default for applications?

Why do people spend money on Cybersecurity? 0:45

Why do people spend money on Cybersecurity?

The Truth About CNAPP and Kubernetes Security 40:09

The Truth About CNAPP and Kubernetes Security

Cybersecurity Isn’t Crowded: Security Engineering and the 5,000 Vendor Problem 1:10:14

Cybersecurity Isn’t Crowded: Security Engineering and the 5,000 Vendor Problem

Merry Christmas from Cloud Security Podcast 0:18

Merry Christmas from Cloud Security Podcast

Centralized VPC Endpoints - Why It Works for AWS Networking 48:42

Centralized VPC Endpoints - Why It Works for AWS Networking

Payment Security with Cryptography, AWS Nitro, and Lambda 19:05

Payment Security with Cryptography, AWS Nitro, and Lambda

AWS reInvent 2024 Highlight Vlog 0:36

AWS reInvent 2024 Highlight Vlog

Building Platforms in Highly Regulated Industries Explained 35:41

Building Platforms in Highly Regulated Industries Explained

What is CADR? 29:05

What is CADR?

3 WAYS TO Compromise Any Public Cloud 0:54

3 WAYS TO Compromise Any Public Cloud

What is Yellow Brick Road in AWS Cloud? 0:28

What is Yellow Brick Road in AWS Cloud?

What is CTEM? 28:13

What is CTEM?

Advent Calendar of Cloud Security Announcement 0:37

Advent Calendar of Cloud Security Announcement

The Role of Platform Engineers in Scaling Enterprise Security 18:48

The Role of Platform Engineers in Scaling Enterprise Security

Building AI-Powered Legal Tools with SageMaker & Bedrock 25:04

Building AI-Powered Legal Tools with SageMaker & Bedrock

Big Cloud Security News coming on Dec 1 0:10

Big Cloud Security News coming on Dec 1

Building Platforms in Regulated Industries 36:33

Building Platforms in Regulated Industries

Dynamic Permission Boundaries: A New Approach to Cloud Security 46:06

Dynamic Permission Boundaries: A New Approach to Cloud Security

Heading to @cncf Kubecon Next week in Salt Lake City - will you be there? 0:25

Heading to @cncf Kubecon Next week in Salt Lake City - will you be there?

Building a Resilient Cloud Security Program after Merger and Acquisition 39:15

Building a Resilient Cloud Security Program after Merger and Acquisition

Building Data Perimeter in Cloud in 2024 56:56

Building Data Perimeter in Cloud in 2024

Real-World Cloud Threats and Multi-Cloud Defense in 2024 33:31

Real-World Cloud Threats and Multi-Cloud Defense in 2024

Navigating NIST CSF 2.0: Guide to Frameworks and Governance 36:30

Navigating NIST CSF 2.0: Guide to Frameworks and Governance

My WILD First HashiCons Experience VLOG 0:49

My WILD First HashiCons Experience VLOG

Building a SOC Team in 2024 - Automation & AI 56:26

Building a SOC Team in 2024 - Automation & AI

Planning ahead for @HashiCorp  Hashiconf in Boston 0:40

Planning ahead for @HashiCorp Hashiconf in Boston

Cloud Identity Lifecycle Management Explained! 33:04

Cloud Identity Lifecycle Management Explained!

Is Your Cloud Strategy Ready for 2024 Security Challenges? 1:02

Is Your Cloud Strategy Ready for 2024 Security Challenges?

Traditional PAM  vs Cloud CPAM for a cloud first world 34:23

Traditional PAM vs Cloud CPAM for a cloud first world

Is your SecOps team trained for Cloud Alerts? Cc @cloudsecuritybootcamp 0:53

Is your SecOps team trained for Cloud Alerts? Cc @cloudsecuritybootcamp

The Role of Cloud Security Research in 2024 35:27

The Role of Cloud Security Research in 2024

Are CloudSec and Appsec Merging? 0:38

Are CloudSec and Appsec Merging?

Cloud Security strategies for Enterprise 0:39

Cloud Security strategies for Enterprise

How MDR and AI are Shaping Cybersecurity in 2024? 31:02

How MDR and AI are Shaping Cybersecurity in 2024?

Why Identity Management Experts NEED to Know About Cloud Security 2:03

Why Identity Management Experts NEED to Know About Cloud Security

The evolution of Cloud Security 0:55

The evolution of Cloud Security

Edge Security is the Key to Cloud Protection 26:42

Edge Security is the Key to Cloud Protection

Happy Friday @cloudsecuritybootcamp 0:16

Happy Friday @cloudsecuritybootcamp

Hi Mom - @fwdcloudsec is a Wrap! 0:32

Hi Mom - @fwdcloudsec is a Wrap!

MultiCloud Security explained! 0:47

MultiCloud Security explained!

What are the Challenges for Incident Response Team in Cloud? 0:41

What are the Challenges for Incident Response Team in Cloud?

I ended up At @fwdcloudsec EU Cloud security Conference 0:16

I ended up At @fwdcloudsec EU Cloud security Conference

The role of Cloud Security Team explained! 0:52

The role of Cloud Security Team explained!

Original Series from Cloud Security Podcast