Cloud Security công khai
[search 0]
Thêm

Download the App!

show episodes
 
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
 
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
 
Welcome to the Cyber Security & Cloud Podcast #CSCP where we will explore the dark secret of cloud and cyber. The podcast focuses on people and their stories and explores the human element that brings so many people together Some episode will be for the well-seasoned cybersecurity veteran but most are about stories of infosec people and how they reach where they are now. The focus and various stream of the podcast is Cybersecurity, Cloud Security, Application Security Social Engineering, and ...
 
Security on Cloud explores the ups and downs, and ins and outs of cloud security like no other podcast. Hear interviews with industry heavyweights, analysts, and technologists in the cloud security and compliance space. You can receive the insights you need to navigate security and compliance in this new cloud-driven world. Also, hear about high-level trends that face the cloud security industry that you need to be on top of to stay ahead. How to deal with compliance nightmares, how the whol ...
 
Cloud adoption increases by the day, while 94% of enterprises use the cloud. Increased adoption has led to businesses struggling to bridge the gap between cloud service capabilities and securing them. The X-Force Cloud Security Podcast will be a place to discuss and explore that gap and security solutions, tools, and practices to bridge it. Brandon Jeanmarie, your host, will be joined with cyber security and cloud experts to discuss different cloud security topics and best practices.
 
Information is now the fuel behind business, politics and many aspects of our personal lives. This information is no longer just sitting in our enterprise data center – it is on our mobile devices, in the cloud and in many places we never imagined. In this podcast we discuss the latest trends and issues affecting Security, Service Management, Mobile Computing and the Cloud. Hosted by Caleb Barlow, Vice President - Strategic Initiatives at IBM, he features topics for both business executives ...
 
Loading …
show series
 
Guest: Karan Dwivedi, Security Engineering Manager, Enterprise Infrastructure Protection @ Google Cloud Topics: Google’s use of Google Cloud is a massive cloud environment with wildly diverse use cases. Could you share, for our listeners, a few examples of the different kinds of things we’re running in GCP? Given that we’re doing these wildly diffe…
 
Anshuman Bhartiya has been in application security for 14 years and is currently the Principal Security Engineer at Thirty Madison. Today with Francesco, they discuss bug bounty, how security approaches differ at big companies and startups, and the state of the industry. The episode is brought to you by Phoenix Security; get in control of your vuln…
 
Cloud Security Podcast - This month we are talking about "Building on the AWS Cloud" and next up on this series, we spoke to Mrunal Shah (Mrunal's Linkedin), Head of Container Security at Warner Bros. Discovery. We talk about how to build a Container or K8s security program while best practices are maintained and team have the right capability and …
 
Want to get the most out of Amazon DynamoDB? Hear directly from a member of the product team! Join Gautham Shanmugam, Amazon DynamoDB Senior Go-to-Market Specialist, as he shares insights into how this powerful database service is being leveraged to power performance in modern, cloud-native applications. He’ll be talking with Clumio’s VP of Product…
 
Es ist 2023 und wir sind gut angekommen. Der erste Freitag der 13. des Jahres hat gehalten was der Aberglaube hergibt. Leere Startmenüs und was nun Herr Microsoft Defender? Eine Runde ChatGPT und dann analysiert Marco Jans Teams Chat Verhalten und hat auch gleich ein ungefragten Verbesserungsvorschlag parat. Links: - Cloud Security Day 2023-02-16 i…
 
Guest: Anoosh Saboori, former Product Manager at Google Cloud Topics: We had zero trust episodes before and definitions vary! When we say zero trust, what do we mean? What about zero trust for workloads in production? When you say “workload,” what do you mean? What is BeyondProd, for those that are unfamiliar with it? And how is this different from…
 
Cloud Security Podcast - This month we are talking about "Breaking the AWS Cloud" and next up on this series, we spoke to Seth Art (Seth's Linkedin) Cloud Penetration Testing Lead (Principal) at Bishop Fox. AWS cloud project to pentest AWS cloud architecture are not spoken about much - this stops today. We have Seth who works in the Cloud Penetrati…
 
Cloud Security Podcast - This month we are talking about "Breaking the AWS Cloud" and next up on this series, we spoke to Nishant Sharma (Nishant's Linkedin), Director, Lab Platform, INE. If you have tried pentesting in AWS Cloud or want to start today with AWS Goat, then this episode with Nishant, behind AWS Goat will help you understand how you c…
 
Guest: Michele Chubirka, Senior Cloud Security Advocate, Google Cloud Topics: We are here to talk about cloud migrations and we are here to talk about failures. What are your favorites? What are your favorite cloud security process failures? What are your favorite cloud security technical failures? What are your favorite cloud security container an…
 
Alex Sidorenko is an experienced risk manager, the host of Risk Awareness Week, and runs a popular blog and Youtube channel called “Risk Academy.” In 2021, Alex was named the Risk Manager of the Year by FERMA for helping save 13 million dollars in insurance premiums. Today, he breaks down the three layers of risk management— basic, standardized, an…
 
With enterprises increasingly leveraging Amazon S3 to power their applications, data lakes, and AI, a data loss disruption can be deeply damaging and time-consuming to recover. More and more organizations, particularly those that are heavily reliant on high-volume data, are beginning to realize that their Amazon S3 needs comprehensive data protecti…
 
Amazon S3 is the powerhouse behind many applications that fuel hyper growth for today’s businesses. Organizations that take the time to optimize how they leverage Amazon S3 are able to leave their competition behind in innovation and operational efficiency. Brightloom is one such company that has built their AI/ML foundation on Amazon S3. Hear from…
 
Market intelligence firm IDC projected that 2022 cloud infrastructure spend would grow by 22%. As organizations increasingly build cloud-native applications, and store their business critical data in the public cloud, the need to secure that data becomes paramount. How has cloud security changed over the last 11 months? Special guest Clarke Rodgers…
 
SOC 2 compliance has become an important part of doing business in today’s threat-laden environment. Slogging through the tedious language of the standard to pull out concrete actions is just the first challenge. Once you have a game plan, implementing and managing it takes valuable time away from other tasks that are more central to your core busi…
 
Ransomware attacks have exposed serious vulnerabilities in business operations across all market sectors. But the recent escalation of political tensions has heightened awareness of what’s at stake when core services are crippled by cyberattacks. Join a panel of experts featuring Rachel Wilson, Former Head of Counterterrorism Operations, National S…
 
You’ve moved your mission critical database to AWS, with the intention of leveraging all the benefits of the cloud – scalability, reliability, availability. And of course, security remains a top priority, especially in this era of increased cybersecurity threats and data breaches. You need a comprehensive data protection plan that can help you reco…
 
Guest: Gary Hayslip, CISO at Softbank Topics: "So we're talking about your journey as a CISO migrating to Cloud. Could you give us the 30 second overview of What triggered your organization's migration to the cloud? When did you and the security organization get brought in? How did you plan your security organization's journey to the cloud? Did you…
 
Cloud Security Podcast - This month we are talking about "Breaking the AWS Cloud" and next up on this series, we spoke to Gafnit Amiga (Gafnit's Linkedin), VP of Security Research at Lightspin who recently discovered the AWS Elastic Container Registry Public (ECR Public) vulnerability. She spoke to us about how she goes about doing cloud security r…
 
The world of data protection is always evolving and there's a reason for it -- cyberattacks are getting more and more sophisticated and elaborate, and we must keep up if we want to stay secure. Threats like social engineering, phishing, and ransomware are an ever-present reality. Let's discuss these topics from the perspective of an AWS Application…
 
Malware and ransomware present a new challenge for your data protection and disaster recovery needs. Native AWS backup is often the go-to when getting started, however, once you need to restore you’ll realize it will take more time than your business can afford to get back up and running. See how Clumio’s SaaS backup and recovery solution simplifie…
 
As enterprises accelerate their adoption of over 175 AWS services, growing volumes of business data become scattered across multiple geos, accounts, services, and clouds. Cloud operations professionals become faced with the daunting task of managing and protecting their data while unleashing their developers to push the boundaries of innovation. Jo…
 
This free 1-hour webinar from GigaOm Research brings together experts in data storage and cloud computing, featuring GigaOm analyst Enrico Signoretti and special guests Sam Saw, COO and EVP of Bonafide, Chadd Kenney, VP of Product at Clumio. The discussion will focus on cloud backup techniques and how to evaluate different backup strategies for the…
 
Guest: Nader Zaveri, Senior Manager of IR and Remediation at Mandiant, now part of Google Cloud Topics: Could we start with a story of a cloud incident response (IR) failure and where things went wrong? What should that team have done to get it right? Are there skills that matter more in cloud incidents than they do for on-prem incidents? Are there…
 
Lester Chng is a Veteran who transferred his war gaming military skills to the cooperate world. After being a Naval Combat Officer with the Singapore Navy for twelve years, he runs security exercise programs for a North American financial institution. Lester prepares high-level executives for worst-case scenario security crises. He explains that ex…
 
Cloud Security Podcast - If Hacking the Cloud is on your mind for 2023 then in this "Breaking the AWS Cloud" month we are kicking things with Nick Frichette (Nick's Linkedin), a Senior Security Researcher from DataDog who is also maintains the site Hacking the Cloud linking offensive security research for AWS, Azure, GCP. Episode ShowNotes, Links a…
 
Die letzte Folge in 2022 blickt auf ein Jahr im Microsoft 365 Umfeld zurück. Was erwartet uns 2023? Was macht Hairless in the Cloud 2023? Nach "nur" 10 Folgen in 2022 haben wir Luft nach oben und könnten die 100er Marke knacken. Wir wünschen euch schöne Feiertage und einen guten Rutsch. WIr sehen und hören uns 2023 wieder. Links: - Pink Thumb 2023 …
 
Guest: Sunil Potti, VP / GM, Google Cloud Topics: One of the biggest shifts we’ve noticed is the shift from building security because we think security is good, to building security as a business. How did you make that cultural shift happen in our organization? With organizations migrating to cloud we have a set of tradeoffs between meeting securit…
 
In this episode of the Virtual Coffee with Ashish edition, we spoke with Shilpi Bhattacharjee (Cloud Security Podcast, Producer). We spoke about Announcements from AWS Reinvent for - new security products announced, updates to existing security products, security addition to existing products and products to lookout for. Podcast Link with favourite…
 
Guest: Jim Higgins, CISO at Snap, former CISO at Square Topics: You were at Google for a long time, and at Google you sat between Google security and Cloud. Now that you're leading security for a major company, how are you prioritizing your focus between your on-premise resources and your cloud resources? How are you thinking about threat detection…
 
Amanda Alvarez is the Senior DevSecOps Engineer at Trace3. Francesco and Amanda met online in a Meetup group called “Let’s Talk Software Security!” Today they discuss building an application security program, managing technical debt, and Amanda’s advice for avoiding burnout as a security professional. The episode is brought to you by Phoenix Securi…
 
In this episode of the Virtual Coffee with Ashish edition, we spoke with Justin Garrison (Personal Website) from AWS to talk about what scenarios make sense to choose AWS EKS vs AWS ECS vs AWS Fargate vs bare metal Kubernetes & everything you need to understand for implementing AWS EKS in your environment. --Announcing Cloud Security Villains Proje…
 
Guests: John Speed Meyers, Security Data Scientist, Chainguard Todd Kulesza, User Experience Researcher, Google Topics: How did you get involved with this year’s Accelerate State of DevOps Report (DORA report)? So what is DORA and why did you decide to focus on supply chain security for the 2022 report? What are the big learnings from this year’s r…
 
Guests: Nikhil Sinha, Group Product Manager, Workspace Security Kelly Anderson, Product Marketing Manager, Workspace Security Topics: We are talking about Google Workspace security today. What kinds of threats do we have to care about here? Are there compliance-related motivations for security here too? Is compliance in the cloud changing? How’s ad…
 
Larry Maccherone is a Dev[Sec]Ops Transformation Architect at Contrast Security to create a wave of DevSecOps cultural transformation in software development and cybersecurity communities. He previously worked for five years at Comcast, leading their DevSecOps Transformation initiative. When it comes to software, Larry says security and quality are…
 
In this episode of the Virtual Coffee with Ashish edition, we spoke with Ashish Desai (Ashish Desai's Linkedin) about how much of the on-premise can work in Cloud, what the online world is saying versus the reality of what businesses are experiencing. --Announcing Cloud Security Villains Project-- We are always looking to find creative ways to educ…
 
Guests: Matt Linton, Chaos Specialist @ Google John Stone, Chaos Coordinator @ Office of the CISO, Google Cloud Topics: Let’s talk about security incident response in the cloud. Back in 2014 when I [Anton] first touched on this, the #1 challenge was getting the data to investigate as cloud providers had few logs available. What are the top 2022 clo…
 
Guest: Greg Sinclair, Security Engineer @ Google Cloud Topics: Could you tell us a bit about your background and how you ended up here at Google? Also, tell us about your team here? We're very excited about the release of the CobaltStrike rules. Could you share more about what they are looking for and second why this is so valuable? How did CobaltS…
 
Guest: Jeff Bollinger, Director of Incident Response and Detection Engineering @ Linkedin Topics: Observability sounds cool (please define it for us BTW), but relating it to security has been “hand-wavy” at best. What is your opinion on the relevance of observability data for security use cases? What use cases are those, apart from saving the data …
 
Frank Kim is a security consultant, a startup advisor and investor, and a Fellow and Curriculum Director at SANS Institute. He’s been writing curriculum and teaching for SANS for 15 years, sculpting the next generation of CISO leaders and cloud security experts. Today on the podcast, he shares his thoughts on the industry, the gate vs guardrail men…
 
In this episode of the Virtual Coffee with Ashish edition, we spoke with Kat Traxler (Kat's Linkedin) about the skillset, certification and knowledge base required to become a cloud security architect in 2023. Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cloudsecuritypodcast.tv Host Twitter: Ashish Rajan (@hashishrajan) Gu…
 
In this episode of the Virtual Coffee with Ashish edition, we spoke with Rodrigo Montoro (Rodrigo's linkedin) about threat modelling and incident response involving the uncommon AWS services which still may be widely used in your organisation and increase your attack surface. Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cl…
 
Guests: Alijca Cade, Director, Financial Services, Office of the CISO, Google Cloud Ken Westin, Director, Security Strategy, Cybereason Robert Wallace, Senior Director, Mandiant, now Google Cloud Topics: How are cloud environments attacked and compromised today? Is it still about the configuration mistakes? Do cryptominers represent a serious threa…
 
In this episode of the Virtual Coffee with Ashish edition, we spoke with Nandesh Guru (Nandesh's Linkedin) about ransomware and supply chain attack mechanisms in AWS and how the world of CSPM have evolved to address the increasing complexities of cloud security Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cloudsecuritypodc…
 
Guest: Dr Anna Belak, Director of Thought Leadership at Sysdig, former Gartner analyst Questions: Analysts (and vendors) coined a log of “C-something acronyms” for cloud security, and two of the people on this episode were directly involved in some of them. What do you make of all the cloud security acronym proliferation? What is CSPM? What gets be…
 
In this episode of the Virtual Coffee with Ashish edition, we spoke with Christophe Parisel (Christophe's Linkedin) about what how to transition from being a technical architect on premise to a cloud security architect and then a cloud native security architect. Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cloudsecuritypod…
 
Dustin Lehr started his software engineer career, which piqued his interest in cyber security. He is now the Sr. Director of Platform Security at Fivetran and an innovative cyber security leader online, dedicated to bettering the industry. In this podcast, he discusses how companies can build their security teams with new talent that doesn’t have t…
 
Guest: Alicja Cade, Director for Financial Services, Office of the CISO, Google Cloud Topics: We are talking about your journey as a CISO migrating to the cloud. Could you give us the overview of … What triggered your organization's migration to the cloud? When did you and the security team get brought in? Did you take going to the cloud as an oppo…
 
In this episode of the Virtual Coffee with Ashish edition, we spoke with Jim Bugwadia (Jim's Twitter) about policy management and compliance as code for Kubernetes and how you can use open source tools like Kyverno and OPA for policy management Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cloudsecuritypodcast.tv Host Twitt…
 
Guests: Lauren Zabierek (@lzxdc), Acting Executive Director of the Belfer Center at the Harvard Kennedy School Christina Morillo (@divinetechygirl), Principal Security Consultant at Trimark Security Topics: We are so excited to have you on the show today talking about your awesome effort, Share The Mic in Cyber. I love that we are Sharing our Mic w…
 
Guest: Mike Sinno, Security Engineering Director, Detection and Response @ Google Topics: You recently were featured in “Hacking Google” videos, can you share a bit about this effort and what role you played? How long have you been at Google? What were you doing before, if you can remember after all your time here? What brought you to Google? We he…
 
Loading …

Hướng dẫn sử dụng nhanh