
Cloud Security Podcast
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud.
We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security.
We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Facebook and Twitter with over 150 people watching and asking questions and interacting with the Guest.
Latest episodes

8 snips
Apr 24, 2025 • 35min
Mindset: Modern SOC Strategies for Cloud & Kubernetes (Ft Sergej Epp. Ex-Deutsche Bank)
Join Ashish Rajan in this episodeas he dives deep into the evolving world of cloud security with Sergej Epp, formerly of Deutsche Bank and Palo Alto Networks, now with Sysdig.Discover why traditional security approaches fall short in today's dynamic cloud-native environments, where workloads resemble swarms of drones rather than predictable trains. Sergej explains the critical shift from basic posture management (CSPM/CNAPP) towards runtime security, emphasizing the need for an "assume breach" mindset.Learn about the staggering reality that over 60% of containers now live for less than a minute and the immense challenges this poses for detection, incident response, and forensics.This episode covers:The evolution from traditional security to cloud-native and runtime security.Why CNAPP/CSPM is like a map, but runtime security is the essential radar.The complexities of modern incident response with ephemeral workloads.Key strategies for Security Operations Centers (SOC) adapting to the cloud.The importance of visibility, data collection, and tools for hybrid and even air-gapped environments.How AI is starting to aid security operations and forensics.Guest Socials: Sergej LinkedinPodcast Twitter - @CloudSecPod If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:-Cloud Security Podcast- Youtube- Cloud Security Newsletter - Cloud Security BootCampIf you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity PodcastQuestions asked:(00:00) Introduction: Cloud Security & The One-Minute Container Problem(01:31) Meet Sergej Epp: 20+ Years in Cybersecurity (Deutsche Bank, Palo Alto, Sysdig)(02:44) What is Cloud Native Today? From Train Stations to Airports with Drones(05:34) Runtime Security Explained: Why It's Crucial Now(11:05) The Evolution of Cloud Security: Beyond Basic Posture Management(13:49) Incident Response Evolution: Tackling One-Minute Containers(18:34) Who Needs Runtime Security? Platform Engineers, SOC Teams & More(21:01) Runtime Security as a Platform: Beyond Detection to Prevention & Insights(24:45) Cloud Security Program Maturity: From On-Prem to Cloud Native SOC(29:20) AI in SOC Operations: Speeding Up Forensics & Context

5 snips
Apr 17, 2025 • 28min
Scaling Container Security Without Slowing Developers
Cailyn Edwards, Co-Chair of Kubernetes SIG Security and Senior Security Engineer at Auth0 by Okta, shares her expertise on scaling container security. She discusses the importance of automating security and bridging the gap between security teams and developers for better collaboration. The conversation highlights the 'Shift Down' philosophy, leveraging open-source tools, and the significance of minimal, immutable images for security. Cailyn also emphasizes getting leadership buy-in to align security with business goals and shares personal anecdotes that enrich the discussion.

Apr 10, 2025 • 35min
How Attackers Stay Hidden Inside Your Azure Cloud
Christian Philipov, a Principal Security Consultant at WithSecure specializing in cloud security, shares insights into common tactics that keep attackers hidden in Azure. He discusses lesser-known APIs like Ibiza and PIM, and highlights the challenges of detecting stealthy activity. Philipov also explains the importance of Microsoft Graph for security operations and how to enhance detection mechanisms. The conversation wraps up with a fun exchange about personal interests like video games and food, showcasing how empathy can play a role in cybersecurity.

Apr 2, 2025 • 16min
How Confluent Migrated Kubernetes Networking Across AWS, Azure & GCP
Ever tried solving DNS security across a multi-cloud, multi-cluster Kubernetes setup? In this episode recorded live at KubeCon, Ashish chats with Nimisha Mehta and Alvaro Aleman from Confluent's Kubernetes Platform Team.Together, they break down the complex journey of migrating to Cilium from default CNI plugins across Azure AKS, AWS EKS, and Google GKE. You’ll hear:How Confluent manages Kubernetes clusters across cloud providers.Real-world issues encountered during DNS security migration.Deep dives into cloud-specific quirks with Azure’s overlay mode, GKE’s Cilium integration, and AWS’s IP routing limitations.Race conditions, IP tables, reverse path filters, and practical workarounds.Lessons they’d share for any platform team planning a similar move.Guest Socials: Alvaro's Linkedin + Nimisha's Linkedin Podcast Twitter - @CloudSecPod If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:-Cloud Security Podcast- Youtube- Cloud Security Newsletter - Cloud Security BootCampIf you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity PodcastQuestions asked:(00:00) Introduction(01:55) A bit about Alvaro(02:41) A bit about Nimisha(03:11) About their Kubecon NA talk(03:51) The Cilium use case(05:16) Using Kubernetes Native tools in all 3 cloud providers(011:41) Lessons learnt from the projectResources spoken about during the interviewConfluent's Multi-Cloud Journey to Cilium: Pitfalls and Lessons Lea... Nimisha Mehta & Alvaro Aleman

10 snips
Mar 26, 2025 • 52min
The New Future of Cloud Security: Vendor Lock-In, Runtime, and SOC Readiness
Chris Hughes, CEO at Acquia, known for his expertise in cybersecurity, joins a powerhouse panel featuring James Berthoty from Latio Tech, Mike Privette of Return on Security, and Francis Odum from Software Analyst Cyber Research. They delve into the evolution of cloud security, discussing the implications of vendor lock-in in a multi-cloud landscape. Runtime security takes center stage, while the rise of AI in security operations garners attention. The experts provide insights on how organizations can adapt their strategies in response to market shifts and technological advancements.

Mar 20, 2025 • 43min
Detection Engineering with Google Cloud
Detection rules aren’t just for fun—they’re critical for securing cloud environments. But are you using them the right way? In this episode, Ashish Rajan sits down with David French, Staff Adoption Engineer for Security at Google Cloud, to break down how organizations can scale Detection as Code across AWS, Azure, and Google Cloud.Why prevention isn’t enough—and how detection fills the gapThe biggest mistakes in detection rules that could blow up your SOCHow to scale detections across hundreds (or thousands) of cloud accountsThe ROI of Detection as Code—why security leaders should careCommon low-hanging fruit detections every cloud security team should implementDavid has spent over a decade working in detection engineering, threat hunting, and building SIEM & EDR products. He shares real-world insights on how companies can improve their detection strategies and avoid costly security missteps.Guest Socials: David's LinkedinPodcast Twitter - @CloudSecPod If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:-Cloud Security Podcast- Youtube- Cloud Security Newsletter - Cloud Security BootCampIf you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity PodcastQuestions asked:(00:00) Introduction(03:06) What is Detection as Code?(03:41) What was before Detection as Code?(05:36) Business ROI for doing Detection as Code?(07:49) Building Security Operations in Google Cloud(12:41) Threat Detection for different type of workload(14:54) What is Google SecOps?(20:36) Different kinds of Detection people can create(24:46) Scaling Detection across many Google Cloud accounts(28:47) The role of Data Pipeline in Detection(31:44) Detections people can start with(34:14) Stages of maturity for detection(36:43) Skillsets for Detection Engineering(39:32) The Fun Section

Mar 13, 2025 • 49min
CNAPPs & CSPMs don’t tell the full cloud security story
Nick Jones, Head of Research at WithSecure and an offensive cloud security expert, dives deep into the often overlooked aspects of cloud security. He explains why relying solely on CNAPPs and CSPMs can leave critical gaps. Nick reveals the biggest cloud attack paths and discusses how cloud pentesting differs from traditional methods. He emphasizes identity management's role over direct attacks, challenges common security misconceptions, and shares real-world insights from red team engagements to bolster organizational defenses.

Mar 6, 2025 • 45min
Securing AI Applications in the Cloud
Bar-el Tayouri, Head of Mend AI at Mend.io, is a leading expert in AI security and application security. In this conversation, he tackles the hidden dangers of shadow AI and the layers of an AI Bill of Materials (AIBOM). Bar-el emphasizes the necessity of red teaming and shares practical strategies for pre- and post-deployment security. He explores the journey of AI adoption and highlights the complexities in balancing innovation with security. Plus, he shares his love for Ethiopian cuisine, connecting personal passions with professional insights.

Feb 28, 2025 • 53min
Realities of Cloud Networking in AWS
Kyler Middleton, a skilled engineer exploring AI, and Jack W. Harter, a DevOps expert with a rich background in high-frequency trading, dive into the complexities of AWS networking. They discuss the formidable challenges of transitioning from on-premises to the cloud, especially in regulated healthcare environments. Listeners will be intrigued by their stories on adapting security measures, the surprising effectiveness of certain anti-patterns, and the hidden compliance hurdles faced during cloud migration, all while navigating the intricate landscape of AWS networks.

Feb 20, 2025 • 54min
Cloud Incident Response in Microsoft Azure
In this engaging discussion, security researcher Katie Knowles, a former Azure incident responder, dives into critical Azure security topics. She unpacks common incident response scenarios and the rising threat of LLM jacking, where attackers misuse authentication tokens. Katie shares insights on privilege escalation in Azure Key Vault and emphasizes the importance of secure role assignments. She also offers practical tips for developing an effective Azure incident response playbook, making Azure's intricate security landscape accessible to all.
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.