
Cloud Security Podcast
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud.
We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security.
We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Facebook and Twitter with over 150 people watching and asking questions and interacting with the Guest.
Latest episodes

Mar 20, 2025 • 43min
Detection Engineering with Google Cloud
Detection rules aren’t just for fun—they’re critical for securing cloud environments. But are you using them the right way? In this episode, Ashish Rajan sits down with David French, Staff Adoption Engineer for Security at Google Cloud, to break down how organizations can scale Detection as Code across AWS, Azure, and Google Cloud.Why prevention isn’t enough—and how detection fills the gapThe biggest mistakes in detection rules that could blow up your SOCHow to scale detections across hundreds (or thousands) of cloud accountsThe ROI of Detection as Code—why security leaders should careCommon low-hanging fruit detections every cloud security team should implementDavid has spent over a decade working in detection engineering, threat hunting, and building SIEM & EDR products. He shares real-world insights on how companies can improve their detection strategies and avoid costly security missteps.Guest Socials: David's LinkedinPodcast Twitter - @CloudSecPod If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:-Cloud Security Podcast- Youtube- Cloud Security Newsletter - Cloud Security BootCampIf you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity PodcastQuestions asked:(00:00) Introduction(03:06) What is Detection as Code?(03:41) What was before Detection as Code?(05:36) Business ROI for doing Detection as Code?(07:49) Building Security Operations in Google Cloud(12:41) Threat Detection for different type of workload(14:54) What is Google SecOps?(20:36) Different kinds of Detection people can create(24:46) Scaling Detection across many Google Cloud accounts(28:47) The role of Data Pipeline in Detection(31:44) Detections people can start with(34:14) Stages of maturity for detection(36:43) Skillsets for Detection Engineering(39:32) The Fun Section

16 snips
Mar 13, 2025 • 49min
CNAPPs & CSPMs don’t tell the full cloud security story
Nick Jones, Head of Research at WithSecure and an offensive cloud security expert, dives deep into the often overlooked aspects of cloud security. He explains why relying solely on CNAPPs and CSPMs can leave critical gaps. Nick reveals the biggest cloud attack paths and discusses how cloud pentesting differs from traditional methods. He emphasizes identity management's role over direct attacks, challenges common security misconceptions, and shares real-world insights from red team engagements to bolster organizational defenses.

Mar 6, 2025 • 45min
Securing AI Applications in the Cloud
Bar-el Tayouri, Head of Mend AI at Mend.io, is a leading expert in AI security and application security. In this conversation, he tackles the hidden dangers of shadow AI and the layers of an AI Bill of Materials (AIBOM). Bar-el emphasizes the necessity of red teaming and shares practical strategies for pre- and post-deployment security. He explores the journey of AI adoption and highlights the complexities in balancing innovation with security. Plus, he shares his love for Ethiopian cuisine, connecting personal passions with professional insights.

Feb 28, 2025 • 53min
Realities of Cloud Networking in AWS
Kyler Middleton, a skilled engineer exploring AI, and Jack W. Harter, a DevOps expert with a rich background in high-frequency trading, dive into the complexities of AWS networking. They discuss the formidable challenges of transitioning from on-premises to the cloud, especially in regulated healthcare environments. Listeners will be intrigued by their stories on adapting security measures, the surprising effectiveness of certain anti-patterns, and the hidden compliance hurdles faced during cloud migration, all while navigating the intricate landscape of AWS networks.

Feb 20, 2025 • 54min
Cloud Incident Response in Microsoft Azure
In this engaging discussion, security researcher Katie Knowles, a former Azure incident responder, dives into critical Azure security topics. She unpacks common incident response scenarios and the rising threat of LLM jacking, where attackers misuse authentication tokens. Katie shares insights on privilege escalation in Azure Key Vault and emphasizes the importance of secure role assignments. She also offers practical tips for developing an effective Azure incident response playbook, making Azure's intricate security landscape accessible to all.

18 snips
Feb 13, 2025 • 51min
AWS Multi-Account Security: What Netflix Learned
Join cloud security experts Patrick Sanders and Joseph Kjar from Netflix as they share their insights on securing AWS multi-account environments. They discuss why an identity-first approach is essential for security, tackling challenges like least privilege access and IAM role migrations. The duo emphasizes balancing security with developer efficiency, and they shed light on strategies for isolating cloud identities amidst complexities. Packed with practical tips, their conversation offers valuable lessons from Netflix's cloud security journey.

12 snips
Feb 4, 2025 • 58min
Cloud Security Detection & Response Strategies That Actually Work
Will Bengtson, VP of Security Operations at HashiCorp, dives into the complexities of cloud security. He explains how cloud incident response differs from on-prem solutions and reveals how quickly attackers exploit APIs. Will shares insights on building effective detection programs while highlighting detection blind spots in AWS and Azure. He also discusses the importance of collaboration in threat hunting and the evolving challenges in managing cloud security. Along the way, he reflects on personal growth and culinary favorites, adding a delightful twist to the conversation.

9 snips
Jan 28, 2025 • 32min
CISO Challenges Across Industries
In this discussion, Sunil Rane, a seasoned cybersecurity leader with over 20 years of experience, sheds light on the intricate challenges faced by CISOs across various sectors. He elaborates on balancing data sensitivity in healthcare with operational efficiency, the complexities of compliance in consulting, and the unique hurdles in the media industry regarding public accountability. Sunil also emphasizes the importance of communication and collaboration for effective cybersecurity leadership, all while sharing a personal touch with tales of his culinary passions.

Jan 24, 2025 • 51min
Why Solving the Data Problem is Key to Cloud Security?
Francis Odum, founder and lead research analyst at Software Analyst Cyber Research, shares valuable insights into cloud security and identity management. He discusses the critical role of addressing data problems to mitigate false positives and enhance SOC efficiency. The conversation also delves into the promising yet complex landscape of AI security, emphasizing the importance of proper data governance. Additionally, Odum predicts key trends for 2025, urging the cybersecurity industry to prioritize innovative solutions while navigating evolving challenges.

35 snips
Jan 21, 2025 • 26min
The economics of cybersecurity and trends
Mike Privette, founder of Return on Security, shares his deep insights into the economics of cybersecurity and its evolving landscape. He discusses how AI is reshaping governance, risk, and compliance while emphasizing the need for strategic planning in cybersecurity efforts. The integration of cloud and application security takes center stage, highlighting unified approaches to protect against data loss. Additionally, Mike touches on the rise of startups in the cyber market and the ongoing challenges they face in this dynamic environment.