Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
…
continue reading
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
…
continue reading
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
…
continue reading
Welcome to Behind the Binary, the podcast that introduces you to the fascinating people, technology, and tools driving the world of reverse engineering. Join your host, Josh Stroschein, a reverse engineer with the FLARE team at Google, and someone passionate about sharing knowledge and shedding light on the art of reverse engineering, as he sits down with intriguing guests to explore the human side of this profession. Behind the Binary goes beyond the code, sharing the stories, motivations, ...
…
continue reading
We will discuss all things Cloud with an emphasis on Cloud Security.
…
continue reading
Security on Cloud explores the ups and downs, and ins and outs of cloud security like no other podcast. Hear interviews with industry heavyweights, analysts, and technologists in the cloud security and compliance space. You can receive the insights you need to navigate security and compliance in this new cloud-driven world. Also, hear about high-level trends that face the cloud security industry that you need to be on top of to stay ahead. How to deal with compliance nightmares, how the whol ...
…
continue reading
Interviews with security engineers and CISOs about challenges in securing their cloud infrastructure. They share their stories and strategies used to drive results.
…
continue reading
1
EP200 Zero Touch Prod, Security Rings, and Foundational Services: How Google Does Workload Security
27:38
27:38
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
27:38
Guest: Michael Czapinski, Security & Reliability Enthusiast, Google Topics: “How Google protects its production services” paper covers how Google's infrastructure balances several crucial aspects, including security, reliability, development speed, and maintainability. How do you prioritize these competing demands in a real-world setting? What atta…
…
continue reading
1
Building Platforms in Regulated Industries
36:32
36:32
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
36:32
At HashiConf 2024 in Boston, our host Ashish Rajan had a great chat over some cannolis and a game of Jenga with AJ Oller, AVP of Engineering at The Hartford about how automation, mainframes, and compliance intersect to drive innovation in regulated industries like insurance. They spoke about why regulations aren't barriers but frameworks to prevent…
…
continue reading
1
EP02 Victor Manuel Alvarez - Motivation, Community, and the Future with YARA-X: Building the Future of Threat Detection
31:51
31:51
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
31:51
In this episode we’re sitting down with Victor Manuel Alvarez, the creator of YARA. YARA is one of the most powerful tools in cybersecurity. We discuss his early career, what motivated him to create YARA, and the role the community has played in its development. Plus, Victor shares his thoughts on the future of YARA and YARA-X, which is a ground-up…
…
continue reading
1
The Adaptive CISO: Digital Defense Evolution with Timothy Youngblood
36:10
36:10
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
36:10
Securing the Digital Future with Former Fortune 500 CISO Tim Youngblood John Richards welcomes Timothy Youngblood, a four-time Fortune 500 CISO and current CISO in Residence at Asterix Security, to discuss the evolving landscape of cybersecurity leadership. With experience at Dell, Kimberly Clark, McDonald's, and T-Mobile, Tim brings unique insight…
…
continue reading
1
EP199 Your Cloud IAM Top Pet Peeves (and How to Fix Them)
29:26
29:26
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
29:26
Guests: Michele Chubirka, Staff Cloud Security Advocate, Google Cloud Sita Lakshmi Sangameswaran, Senior Developer Relations Engineer, Google Cloud Topics: What is your reaction to “in the cloud you are one IAM mistake away from a breach”? Do you like it or do you hate it? Or do you "it depends" it? :-) Everyone's talking about how "identity is the…
…
continue reading
1
Dynamic Permission Boundaries: A New Approach to Cloud Security
46:05
46:05
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
46:05
In this episode, Ashish spoke with Kushagra Sharma, Staff Cloud Security Engineer, to delve into the complexities of managing Identity Access Management (IAM) at scale. Drawing on his experiences from Booking.com and other high-scale environments, Kushagra shares insights into scaling IAM across thousands of AWS accounts, creating secure and develo…
…
continue reading
1
EP198 GenAI Security: Unseen Attack Surfaces & AI Pentesting Lessons
27:22
27:22
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
27:22
Guests: Ante Gojsalic, Co-Founder & CTO at SplxAI Topics: What are some of the unique challenges in securing GenAI applications compared to traditional apps? What current attack surfaces are most concerning for GenAI apps, and how do you see these evolving in the future? Do you have your very own list of top 5 GenAI threats? Everybody seem to! What…
…
continue reading
1
Building a Resilient Cloud Security Program after Merger and Acquisition
39:14
39:14
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
39:14
In this episode, host Ashish Rajan sits down with Prahathess Rengasamy, a cloud security expert with extensive experience at companies like Credit Karma, Block, and Apple. Together, they explore the challenges and best practices for scaling cloud security, especially in the complex scenarios of mergers and acquisitions. Starting with foundational e…
…
continue reading
1
EP197 SIEM (Decoupled or Not), and Security Data Lakes: A Google SecOps Perspective
29:34
29:34
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
29:34
Guest: Travis Lanham, Uber Tech Lead (UTL) for Security Operations Engineering, Google Cloud Topics: There’s been a ton of discussion in the wake of the three SIEM week about the future of SIEM-like products. We saw a lot of takes on how this augurs the future of disassembled or decoupled SIEMs. Can you explain what these disassembled SIEMs are all…
…
continue reading
1
Building Data Perimeter in Cloud in 2024
56:14
56:14
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
56:14
In this episode, Ashish gets into the critical topic of data perimeters in AWS with our guest, Tyler Warren, a Lead Cloud Security Engineer at USAA. As cloud environments continue to evolve, the importance of securing your data through trusted networks and identities has never been more crucial. Tyler shares his insights on the challenges and strat…
…
continue reading
1
EP01 Nick Harbour - Early Days of Incident Response, Mandiant History and FLARE-ON
1:04:53
1:04:53
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
1:04:53
Nick Harbour discusses his career journey from his early days in the Air Force to his work at Mandiant. He shares insights into the evolution of malware, his contributions to the field of malware analysis, and the development of the Flare-On contest, a reverse engineering challenge.Josh Stroschein
…
continue reading
1
EP196 AI+TI: What Happens When Two Intelligences Meet?
28:08
28:08
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
28:08
Guest: Vijay Ganti, Director of Product Management, Google Cloud Security Topics: What have been the biggest pain points for organizations trying to use threat intelligence (TI)? Why has it been so difficult to convert threat knowledge into effective security measures in the past? In the realm of AI, there's often hype (and people who assume “it’s …
…
continue reading
1
Navigating NIST CSF 2.0: Guide to Frameworks and Governance
36:29
36:29
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
36:29
In this episode, we sat down with Lukasz Gogolkiewicz, an Australia-based Cybersecurity Leader and former pentester, to explore his journey from offensive security into cybersecurity leadership. Lukasz, also a speaker coach at BlackHat USA, brings valuable insights into what it takes to shift from being technical to managing compliance, governance,…
…
continue reading
1
EP195 Containers vs. VMs: The Security Showdown!
41:16
41:16
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
41:16
Cross-over hosts: Kaslin Fields, co-host at Kubernetes Podcast Abdel Sghiouar, co-host at Kubernetes Podcast Guest: Michele Chubirka, Cloud Security Advocate, Google Cloud Topics: How would you approach answering the question ”what is more secure, container or a virtual machine (VM)?” Could you elaborate on the real-world implications of this for s…
…
continue reading
1
The role of data normalization in cloud security - Kabir Mathur, CEO at Leen
36:02
36:02
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
36:02
Lars and Kabir Mathur, CEO of Leen, discuss the concept of unified APIs for security data, emphasizing the need for normalization and integration of various security tools. Kabir explains how Leen differentiates itself by not only providing data connectors but also delivering data over an API, making it accessible for developers. They explore the c…
…
continue reading
1
Building a SOC Team in 2024 - Automation & AI
56:25
56:25
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
56:25
What is the future of SOC? In this episode Ashish sat down with Allie Mellen, Principal Analyst at Forrester, to explore the current state of security operations and the evolving role of AI in cybersecurity. Allie spoke about why Cloud Detection Response (CDR) might be dead, how Generative AI is failing to live up to its hype in security use cases,…
…
continue reading
1
EP194 Deep Dive into ADR - Application Detection and Response
30:55
30:55
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
30:55
Guest: Daniel Shechter, Co-Founder and CEO at Miggo Security Topics: Why do we need Application Detection and Response (ADR)? BTW, how do you define it? Isn’t ADR a subset of CDR (for cloud)? What is the key difference that sets ADR apart from traditional EDR and CDR tools? Why can’t I just send my application data - or eBPF traces - to my SIEM and…
…
continue reading
1
Open Source AI Unleashed: Transparency, Sovereignty, and Data Control with JJ Asghar
46:21
46:21
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
46:21
Open Source AI: Transparency, Sovereignty, and Who Controls the Data In this episode of Cyber Sentries, host John Richards is joined by JJ Asghar, an Open Source Champion and Developer Advocate at IBM. They explore the importance of open source in the AI world, how transparency can allow for AI sovereignty, and why we should care about who controls…
…
continue reading
1
Cloud Identity Lifecycle Management Explained!
33:03
33:03
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
33:03
In this episode Ashish Rajan sits down with Shashwat Sehgal, co-founder and CEO of P0 Security, to talk about the complexities of cloud identity lifecycle management. Shashwat spoke to us about why traditional identity solutions like SAML are no longer sufficient in today’s cloud environments. He discusses the need for organisations to adopt a more…
…
continue reading
1
EP193 Inherited a Cloud? Now What? How Do I Secure It?
30:41
30:41
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
30:41
Guests: Taylor Lehmann, Director at Office of the CISO, Google Cloud Luis Urena, Cloud Security Architect, Google Cloud Topics There is a common scenario where security teams are brought in after a cloud environment is already established. From your experience, how does this late involvement typically impact the organization's security posture and …
…
continue reading
1
Traditional PAM vs Cloud CPAM for a cloud first world
34:22
34:22
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
34:22
In this episode of the Cloud Security Podcast, Ashish sat down with Art Poghosyan, CEO and co-founder of Britive, to explore the changing world of identity and access management (IAM) in the cloud era. With over two decades of experience in the identity space, Art breaks down the challenges of traditional Privileged Access Management (PAM) and how …
…
continue reading
1
The Role of Cloud Security Research in 2024
35:26
35:26
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
35:26
Why does Cloud Security Research matter in 2024? At fwd:cloudsec EU in Brussels, we sat down with Scott Piper, a renowned cloud security researcher at Wiz, to discuss the growing importance of cloud security research and its real-world impact. Scott spoke to us about the critical differences between traditional security testing and cloud security r…
…
continue reading
1
EP192 Confidential + AI: Can AI Keep a Secret?
33:04
33:04
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
33:04
Guest: Nelly Porter, Director of PM, Cloud Security at Google Cloud Topics: Share your story and how you ended here doing confidential AI at Google? What problem does confidential compute + AI solve and for what clients? What are some specific real-world applications or use cases where you see the combination of AI and confidential computing making…
…
continue reading
1
EP191 Why Aren't More Defenders Winning? Defender’s Advantage and How to Gain it!
23:36
23:36
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
23:36
Guest: Dan Nutting, Manager - Cyber Defense, Google Cloud Topics: What is the Defender’s Advantage and why did Mandiant decide to put this out there? This is the second edition. What is different about DA-II? Why do so few defenders actually realize their Defender’s Advantage? The book talks about the importance of being "intelligence-led" in cyber…
…
continue reading
1
Edge Security is the Key to Cloud Protection
26:41
26:41
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
26:41
How does Edge Security fit into the future of Cloud Protection ? In this episode, we sat down with Brian McHenry, Global Head of Cloud Security Engineering at Check Point at BlackHat USA, to chat about the evolving landscape of cloud security in 2024. With cloud adoption accelerating and automation reshaping how we manage security, Brian spoke to u…
…
continue reading
1
EP190 Unraveling the Security Data Fabric: Need, Benefits, and Futures
30:00
30:00
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
30:00
Guest: Josh Liburdi, Staff Security Engineer, Brex Topics: What is this “security data fabric”? Can you explain the technology? Is there a market for this? Is this same as security data pipelines? Why is this really needed? Won’t your SIEM vendor do it? Who should adopt it? Or, as Tim says, what gets better once you deploy it? Is reducing cost a bi…
…
continue reading
1
Proactive cloud security - Rotem Levi, Cloud Security Architect
31:32
31:32
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
31:32
In this conversation, Rotem Levi, a Cloud Security Architect, discusses the importance of proactive cloud security. He emphasizes the need for a balance between cost optimization and security, as well as the significance of good security practices in reducing cloud spend. Rotem also highlights the importance of having order in infrastructure and th…
…
continue reading
1
Is your CI/CD Pipeline your Biggest Security Risk?
29:55
29:55
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
29:55
How CI/CD Tools can expose your Code to Security Risks? In this episode, we’re joined by Mike Ruth, Senior Staff Security Engineer at Rippling and returning guest, live from BlackHat 2024. Mike dives deep into his research on CI/CD pipeline security, focusing on popular tools like GitHub Actions, Terraform, and Buildkite. He reveals the hidden vuln…
…
continue reading
1
Demystifying Zero Trust: Key Policy Checks for Cloud Native Security with Zack Butcher
32:32
32:32
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
32:32
Decoding Zero Trust Security for Cloud Native Environments In this episode of Cyber Sentries, John Richards welcomes Zack Butcher, Founding Engineer at Tetrate, to explore the critical components of zero trust security for cloud native and microservice environments. Zack, with deep expertise from his time at Google and work with NIST, shares practi…
…
continue reading
1
EP189 How Google Does Security Programs at Scale: CISO Insights
30:23
30:23
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
30:23
Guest: Royal Hansen, CISO, Alphabet Topics: What were you thinking before you took that “Google CISO” job? Google's infrastructure is vast and complex, yet also modern. How does this influence the design and implementation of your security programs compared to other organizations? Are there any specific challenges or advantages that arise from oper…
…
continue reading
1
State of Cloud Security - Practitioner Edition
56:12
56:12
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
56:12
In this episode of the Cloud Security Podcast, we bring together an incredible panel of experts to explore the evolving landscape of cloud security in 2024. Hosted by Ashish Rajan, the discussion dives deep into the challenges and realities of today’s multi-cloud environments. With perspectives ranging from seasoned veterans to emerging voices this…
…
continue reading
1
Building ElectricEye, an open-source CSPM tool - Jonathan Rau, VP / Distinguished Engineer at Query
52:48
52:48
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
52:48
In this episode, Lars Kamp interviews Jonathan Rau, a distinguished engineer at Query, about Electric Eye, an open-source CSPM (cloud security posture management) tool.Fix
…
continue reading
1
EP188 Beyond the Buzzwords: Identity's True Role in Cloud and SaaS Security
29:28
29:28
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
29:28
Guest: Dor Fledel, Founder and CEO of Spera Security, now Sr Director of Product Management at Okta Topics: We say “identity is the new perimeter,” but I think there’s a lof of nuance to it. Why and how does it matter specifically in cloud and SaaS security? How do you do IAM right in the cloud? Help us with the acronym soup - ITDR, CIEM also ISPM …
…
continue reading
1
BlackHat USA 2024 Highlights and Recap
39:46
39:46
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
39:46
What were the main themes at BlackHat USA 2024? With respect to Cloud Security, maybe with a sprinkle of AI Security. Our team was on the ground at BlackHat and DefCon32 this year, we heard many talks and panels, spoke to many practitioner, leaders and CISOs and had the pleasure of recording some great interviews (coming soon!). This conversation i…
…
continue reading
1
EP187 Conquering SOC Challenges: Leadership, Burnout, and the SIEM Evolution
29:41
29:41
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
29:41
Guest: Nicole Beckwith, Sr. Security Engineering Manager, Threat Operations @ Kroger Topics: What are the most important qualities of a successful SOC leader today? What is your approach to building and maintaining a high-functioning SOC team? How do you approach burnout in a SOC team? What are some of the biggest challenges facing SOC teams today?…
…
continue reading
1
Building an Incident Response Team for High-Growth Companies
27:24
27:24
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
27:24
In this episode, we sit down with Santiago, a Senior Security Engineer at Canva, to talk about the complexities of building and managing an incident response team, especially in high-growth companies. Santiago shares his experience transitioning from penetration testing to incident response and highlights the unique challenges that come with protec…
…
continue reading
1
EP186 Cloud Security Tools: Trust the Cloud Provider or Go Third-Party? An Epic Debate, Anton vs Tim
27:18
27:18
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
27:18
Guests: A debate between Tim and Anton, no guests Debate positions: You must buy the majority of cloud security tools from a cloud provider, here is why. You must buy the majority of cloud security tools from a 3rd party security vendor, here is why. Resources: EP74 Who Will Solve Cloud Security: A View from Google Investment Side EP22 Securing Mul…
…
continue reading
1
Decoding Machine Language: The Next Phase of the AI Cloud Security Revolution with Murali Balcha
27:00
27:00
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
27:00
Decoding the Language of Machines: AI's Potential to Revolutionize Cloud Security In this episode of Cyber Sentries, host John Richards is joined by Murali Balcha, founder and CTO at Trilio, to explore how AI could transform cloud security by understanding the unique language of machines. Balcha brings over 20 years of experience in IT, particularl…
…
continue reading
1
EP185 SAIF-powered Collaboration to Secure AI: CoSAI and Why It Matters to You
24:27
24:27
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
24:27
Guest: David LaBianca, Senior Engineering Director, Google Topics: The universe of AI risks is broad and deep. We’ve made a lot of headway with our SAIF framework: can you give us a) a 90 second tour of SAIF and b) share how it’s gotten so much traction and c) talk about where we go next with it? The Coalition for Secure AI (CoSAI) is a collaborati…
…
continue reading
1
State of Cloud Security 2024 - Leadership Edition
25:31
25:31
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
25:31
Leadership Insights on Cloud Security in 2024. Ashish sat down with return guest Srinath Kuruvadi, a seasoned cloud security leader with over two decades of experience in the field. Together, they explored the current state and future of cloud security, discussing the importance of detection & incident response teams, building and maintaining a rob…
…
continue reading
1
EP184 One Week SIEM Migration: Fact or Fiction?
24:45
24:45
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
24:45
Guest: Manan Doshi, Senior Security Engineer @ Etsy Questions: In your experience, what are the biggest challenges organizations face when migrating to a new SIEM platform? How did you solve them? Many SIEM projects have problems, but a decent chunk of these problems are not about the tool being broken. How did you decide to migrate? When is it tim…
…
continue reading
1
Cloud Native Strategies from a FinTech CISO
21:56
21:56
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
21:56
What are you doing differently today that you're stopping tomorrow's legacy? In this episode Ashish spoke to Adrian Asher, CISO and Cloud Architect at Checkout.com, to explore the journey from monolithic architecture to cloud-native solutions in a regulated fintech environment. Adrian shared his perspective on why there "aren't enough lambdas" and …
…
continue reading
1
EP183 Cloud Security Journeys: Improve, Evolve, Transform with Cloud Customers
30:15
30:15
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
30:15
Guests: Jaffa Edwards, Senior Security Manager @ Google Cloud Lyka Segura, Cloud Security Engineer @ Google Cloud Topics: Security transformation is hard, do you have any secret tricks or methods that actually make it happen? Can you share a story about a time when you helped a customer transform their cloud security posture? Not just improve, but …
…
continue reading
1
Fixing Cloud Security with AWS Lambda
21:25
21:25
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
21:25
How to secure AWS cloud using AWS Lambda? We spoke to Lily Chau from Roku at BSidesSF about her experience and innovative approach to tackling security issues in AWS environments. From deploying IAM roles to creating impactful playbooks with AWS Lambda, Lily shared her take on automating remediation processes. We spoke about the challenges of manag…
…
continue reading
1
EP182 ITDR: The Missing Piece in Your Security Puzzle or Yet Another Tool to Buy?
28:20
28:20
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
28:20
Guest: Adam Bateman, Co-founder and CEO, Push Security Topics: What is Identity Threat Detection and Response (ITDR)? How do you define it? What gets better at a client organization once ITDR is deployed? Do we also need “ISPM” (parallel to CDR/CSPM), and what about CIEM? Workload identity ITDR vs human identity ITDR? Do we need both? Are these the…
…
continue reading
1
What is confidential computing? Explained for 2024
22:10
22:10
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
22:10
How can you protect your data with Confidential Compute and Containers? Ashish spoke to Zvonko Kaiser, Principal Systems Software Engineer, Confidential Containers and Kubernetes at Nvidia about confidential containers, confidential computing, and their importance in protecting sensitive data. They speak about the various threat models, use cases, …
…
continue reading
1
EP181 Detection Engineering Deep Dive: From Career Paths to Scaling SOC Teams
30:32
30:32
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
30:32
Guest: Zack Allen, Senior Director of Detection & Research @ Datadog, creator of Detection Engineering Weekly Topics: What are the biggest challenges facing detection engineers today? What do you tell people who want to consume detections and not engineer them? What advice would you give to someone who is interested in becoming a detection engineer…
…
continue reading
1
Navigating the AI Revolution in AppSec: Ori Bendet's Insights on the Future of Application Security
31:50
31:50
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
31:50
Ori Bendet Shares Insights on AppSec and Managing AI Risks In this episode of Cyber Sentries, John Richards is joined by Ori Bendet, VP of Product Management at Checkmarx, a leader in application security. They explore the critical role of application security in today's digital landscape and discuss strategies for managing the risks and opportunit…
…
continue reading
1
The Evolution of Infrastructure as Code so far - 2024 Edition
27:46
27:46
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
27:46
How to implement infrastructure as code? Ashish spoke to Armon Dadgar. Co-Founder and CTO at HashiCorp at Hashidays London. Armon speaks about his journey from co-creating Terraform, the first open-source language in the IaC space, to addressing the complex challenges enterprises face in cloud environments today. They speak about why having a platf…
…
continue reading
1
60-The Talking Cloud Podcast-audio only -Guest-Ori Mankali, SVP of R&D, Akeyless Security
50:30
50:30
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
50:30
Episode #60 features Ori Mankali. Ori is a highly seasoned and experienced software developer and leader who now heads engineering for Akeyless Security. Ori is a pioneer in cloud computing, cloud security, and container technologies. Listen as we discuss numerous topics including zero-trust, remote access security, AI, software development, and mo…
…
continue reading