
Cloud Security Podcast
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud.
We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security.
We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Facebook and Twitter with over 150 people watching and asking questions and interacting with the Guest.
Latest episodes

5 snips
Jun 3, 2025 • 40min
Adapting to New Threats, Copilot Risks & The Future of Data (Feat. Matthew Radolec, Varonis)
Matthew Radolec leads systems engineering and incident response at Varonis, passionately dedicated to data protection. He delves into the surge of AI-driven phishing and the risks posed by tools like Copilot. The conversation highlights the alarming statistic that 86% of attacks stem from credential misuse and discusses the rising threat of AI-powered social engineering. Radolec emphasizes the critical need for robust access management and proactive measures in a landscape increasingly dominated by AI, ensuring data integrity amidst evolving challenges.

23 snips
May 27, 2025 • 38min
Securing AI: Threat Modeling & Detection
Joining the discussion are Jackie Bow, a technical lead at Anthropic focused on threat detection, and Kane Narraway, head of enterprise security at Canva specializing in zero trust. They debate whether AI is a security threat or an innovative ally. Jackie reveals how to harness AI, even its quirks, for effective threat detection, while Kane emphasizes the need for robust threat modeling amid new risks. They also tackle the complexities of AI in production and whether AI tools enhance or jeopardize security skills, all served with a dash of humor.

9 snips
May 20, 2025 • 41min
CYBERSECURITY for AI: The New Threat Landscape & How Do We Secure It?
In this engaging discussion, Ankur Shah, Co-Founder and CEO of Straiker, dives into the intersection of AI and cybersecurity. He emphasizes the need for innovative security measures as AI reshapes threat landscapes. Ankur reveals why securing AI requires AI itself and highlights the unique challenges posed by unstructured data. He discusses market movements in AI security, recent acquisitions, and the vital distinction between training and inference in AI. Personal anecdotes spice up the conversation, including a touch of his love for Indian cuisine.

May 15, 2025 • 19min
Cloud Security Evolved: From CNAPP to AI Threats
Elad Koren, Vice President of Product Management at Palo Alto Networks, shares his expertise on the fast-paced evolution of cloud security. He discusses the shift from traditional tools to the necessity of cloud-aware Security Operations Centers. The conversation dives into the dual role of AI, empowering both attackers and defenders. Elad emphasizes the importance of AI governance and offers practical tips for organizations navigating their cloud adoption journey, from securing code early on to ensuring comprehensive infrastructure visibility.

9 snips
May 9, 2025 • 54min
RSA Conference 2025 Recap: Top Themes, Actionable Insights & Future Trends
Join Francis Odum, founder of Software Analyst Cyber Research, Chris Hughes of Aquia and Resilient Cyber, cloud and AppSec engineer James Berthoty, and secure coding advocate Tanya Janca as they unpack insights from RSA Conference 2025. They discuss the transformative impact of AI on AppSec and security operations, the importance of runtime security, and innovative strategies for vulnerability management. Expect candid takes on industry challenges like ransomware and the diminishing focus on zero trust—along with actionable insights for the future of cybersecurity.

16 snips
Apr 24, 2025 • 35min
Mindset: Modern SOC Strategies for Cloud & Kubernetes (Ft Sergej Epp. Ex-Deutsche Bank)
Join Ashish Rajan in this episodeas he dives deep into the evolving world of cloud security with Sergej Epp, formerly of Deutsche Bank and Palo Alto Networks, now with Sysdig.Discover why traditional security approaches fall short in today's dynamic cloud-native environments, where workloads resemble swarms of drones rather than predictable trains. Sergej explains the critical shift from basic posture management (CSPM/CNAPP) towards runtime security, emphasizing the need for an "assume breach" mindset.Learn about the staggering reality that over 60% of containers now live for less than a minute and the immense challenges this poses for detection, incident response, and forensics.This episode covers:The evolution from traditional security to cloud-native and runtime security.Why CNAPP/CSPM is like a map, but runtime security is the essential radar.The complexities of modern incident response with ephemeral workloads.Key strategies for Security Operations Centers (SOC) adapting to the cloud.The importance of visibility, data collection, and tools for hybrid and even air-gapped environments.How AI is starting to aid security operations and forensics.Guest Socials: Sergej LinkedinPodcast Twitter - @CloudSecPod If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:-Cloud Security Podcast- Youtube- Cloud Security Newsletter - Cloud Security BootCampIf you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity PodcastQuestions asked:(00:00) Introduction: Cloud Security & The One-Minute Container Problem(01:31) Meet Sergej Epp: 20+ Years in Cybersecurity (Deutsche Bank, Palo Alto, Sysdig)(02:44) What is Cloud Native Today? From Train Stations to Airports with Drones(05:34) Runtime Security Explained: Why It's Crucial Now(11:05) The Evolution of Cloud Security: Beyond Basic Posture Management(13:49) Incident Response Evolution: Tackling One-Minute Containers(18:34) Who Needs Runtime Security? Platform Engineers, SOC Teams & More(21:01) Runtime Security as a Platform: Beyond Detection to Prevention & Insights(24:45) Cloud Security Program Maturity: From On-Prem to Cloud Native SOC(29:20) AI in SOC Operations: Speeding Up Forensics & Context

12 snips
Apr 17, 2025 • 28min
Scaling Container Security Without Slowing Developers
Cailyn Edwards, Co-Chair of Kubernetes SIG Security and Senior Security Engineer at Auth0 by Okta, shares her expertise on scaling container security. She discusses the importance of automating security and bridging the gap between security teams and developers for better collaboration. The conversation highlights the 'Shift Down' philosophy, leveraging open-source tools, and the significance of minimal, immutable images for security. Cailyn also emphasizes getting leadership buy-in to align security with business goals and shares personal anecdotes that enrich the discussion.

Apr 10, 2025 • 35min
How Attackers Stay Hidden Inside Your Azure Cloud
Christian Philipov, a Principal Security Consultant at WithSecure specializing in cloud security, shares insights into common tactics that keep attackers hidden in Azure. He discusses lesser-known APIs like Ibiza and PIM, and highlights the challenges of detecting stealthy activity. Philipov also explains the importance of Microsoft Graph for security operations and how to enhance detection mechanisms. The conversation wraps up with a fun exchange about personal interests like video games and food, showcasing how empathy can play a role in cybersecurity.

Apr 2, 2025 • 16min
How Confluent Migrated Kubernetes Networking Across AWS, Azure & GCP
Ever tried solving DNS security across a multi-cloud, multi-cluster Kubernetes setup? In this episode recorded live at KubeCon, Ashish chats with Nimisha Mehta and Alvaro Aleman from Confluent's Kubernetes Platform Team.Together, they break down the complex journey of migrating to Cilium from default CNI plugins across Azure AKS, AWS EKS, and Google GKE. You’ll hear:How Confluent manages Kubernetes clusters across cloud providers.Real-world issues encountered during DNS security migration.Deep dives into cloud-specific quirks with Azure’s overlay mode, GKE’s Cilium integration, and AWS’s IP routing limitations.Race conditions, IP tables, reverse path filters, and practical workarounds.Lessons they’d share for any platform team planning a similar move.Guest Socials: Alvaro's Linkedin + Nimisha's Linkedin Podcast Twitter - @CloudSecPod If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:-Cloud Security Podcast- Youtube- Cloud Security Newsletter - Cloud Security BootCampIf you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity PodcastQuestions asked:(00:00) Introduction(01:55) A bit about Alvaro(02:41) A bit about Nimisha(03:11) About their Kubecon NA talk(03:51) The Cilium use case(05:16) Using Kubernetes Native tools in all 3 cloud providers(011:41) Lessons learnt from the projectResources spoken about during the interviewConfluent's Multi-Cloud Journey to Cilium: Pitfalls and Lessons Lea... Nimisha Mehta & Alvaro Aleman

19 snips
Mar 26, 2025 • 52min
The New Future of Cloud Security: Vendor Lock-In, Runtime, and SOC Readiness
Chris Hughes, CEO at Acquia, known for his expertise in cybersecurity, joins a powerhouse panel featuring James Berthoty from Latio Tech, Mike Privette of Return on Security, and Francis Odum from Software Analyst Cyber Research. They delve into the evolution of cloud security, discussing the implications of vendor lock-in in a multi-cloud landscape. Runtime security takes center stage, while the rise of AI in security operations garners attention. The experts provide insights on how organizations can adapt their strategies in response to market shifts and technological advancements.