

Cloud Security Podcast
Cloud Security Podcast Team
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud.
We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security.
We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Facebook and Twitter with over 150 people watching and asking questions and interacting with the Guest.
We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security.
We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Facebook and Twitter with over 150 people watching and asking questions and interacting with the Guest.
Episodes
Mentioned books

Apr 10, 2025 • 35min
How Attackers Stay Hidden Inside Your Azure Cloud
Christian Philipov, a Principal Security Consultant at WithSecure specializing in cloud security, shares insights into common tactics that keep attackers hidden in Azure. He discusses lesser-known APIs like Ibiza and PIM, and highlights the challenges of detecting stealthy activity. Philipov also explains the importance of Microsoft Graph for security operations and how to enhance detection mechanisms. The conversation wraps up with a fun exchange about personal interests like video games and food, showcasing how empathy can play a role in cybersecurity.

Apr 2, 2025 • 16min
How Confluent Migrated Kubernetes Networking Across AWS, Azure & GCP
Ever tried solving DNS security across a multi-cloud, multi-cluster Kubernetes setup? In this episode recorded live at KubeCon, Ashish chats with Nimisha Mehta and Alvaro Aleman from Confluent's Kubernetes Platform Team.Together, they break down the complex journey of migrating to Cilium from default CNI plugins across Azure AKS, AWS EKS, and Google GKE. You’ll hear:How Confluent manages Kubernetes clusters across cloud providers.Real-world issues encountered during DNS security migration.Deep dives into cloud-specific quirks with Azure’s overlay mode, GKE’s Cilium integration, and AWS’s IP routing limitations.Race conditions, IP tables, reverse path filters, and practical workarounds.Lessons they’d share for any platform team planning a similar move.Guest Socials: Alvaro's Linkedin + Nimisha's Linkedin Podcast Twitter - @CloudSecPod If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:-Cloud Security Podcast- Youtube- Cloud Security Newsletter - Cloud Security BootCampIf you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity PodcastQuestions asked:(00:00) Introduction(01:55) A bit about Alvaro(02:41) A bit about Nimisha(03:11) About their Kubecon NA talk(03:51) The Cilium use case(05:16) Using Kubernetes Native tools in all 3 cloud providers(011:41) Lessons learnt from the projectResources spoken about during the interviewConfluent's Multi-Cloud Journey to Cilium: Pitfalls and Lessons Lea... Nimisha Mehta & Alvaro Aleman

19 snips
Mar 26, 2025 • 52min
The New Future of Cloud Security: Vendor Lock-In, Runtime, and SOC Readiness
Chris Hughes, CEO at Acquia, known for his expertise in cybersecurity, joins a powerhouse panel featuring James Berthoty from Latio Tech, Mike Privette of Return on Security, and Francis Odum from Software Analyst Cyber Research. They delve into the evolution of cloud security, discussing the implications of vendor lock-in in a multi-cloud landscape. Runtime security takes center stage, while the rise of AI in security operations garners attention. The experts provide insights on how organizations can adapt their strategies in response to market shifts and technological advancements.

Mar 20, 2025 • 43min
Detection Engineering with Google Cloud
Detection rules aren’t just for fun—they’re critical for securing cloud environments. But are you using them the right way? In this episode, Ashish Rajan sits down with David French, Staff Adoption Engineer for Security at Google Cloud, to break down how organizations can scale Detection as Code across AWS, Azure, and Google Cloud.Why prevention isn’t enough—and how detection fills the gapThe biggest mistakes in detection rules that could blow up your SOCHow to scale detections across hundreds (or thousands) of cloud accountsThe ROI of Detection as Code—why security leaders should careCommon low-hanging fruit detections every cloud security team should implementDavid has spent over a decade working in detection engineering, threat hunting, and building SIEM & EDR products. He shares real-world insights on how companies can improve their detection strategies and avoid costly security missteps.Guest Socials: David's LinkedinPodcast Twitter - @CloudSecPod If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:-Cloud Security Podcast- Youtube- Cloud Security Newsletter - Cloud Security BootCampIf you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity PodcastQuestions asked:(00:00) Introduction(03:06) What is Detection as Code?(03:41) What was before Detection as Code?(05:36) Business ROI for doing Detection as Code?(07:49) Building Security Operations in Google Cloud(12:41) Threat Detection for different type of workload(14:54) What is Google SecOps?(20:36) Different kinds of Detection people can create(24:46) Scaling Detection across many Google Cloud accounts(28:47) The role of Data Pipeline in Detection(31:44) Detections people can start with(34:14) Stages of maturity for detection(36:43) Skillsets for Detection Engineering(39:32) The Fun Section

16 snips
Mar 13, 2025 • 49min
CNAPPs & CSPMs don’t tell the full cloud security story
Nick Jones, Head of Research at WithSecure and an offensive cloud security expert, dives deep into the often overlooked aspects of cloud security. He explains why relying solely on CNAPPs and CSPMs can leave critical gaps. Nick reveals the biggest cloud attack paths and discusses how cloud pentesting differs from traditional methods. He emphasizes identity management's role over direct attacks, challenges common security misconceptions, and shares real-world insights from red team engagements to bolster organizational defenses.

Mar 6, 2025 • 45min
Securing AI Applications in the Cloud
Bar-el Tayouri, Head of Mend AI at Mend.io, is a leading expert in AI security and application security. In this conversation, he tackles the hidden dangers of shadow AI and the layers of an AI Bill of Materials (AIBOM). Bar-el emphasizes the necessity of red teaming and shares practical strategies for pre- and post-deployment security. He explores the journey of AI adoption and highlights the complexities in balancing innovation with security. Plus, he shares his love for Ethiopian cuisine, connecting personal passions with professional insights.

Feb 28, 2025 • 53min
Realities of Cloud Networking in AWS
Kyler Middleton, a skilled engineer exploring AI, and Jack W. Harter, a DevOps expert with a rich background in high-frequency trading, dive into the complexities of AWS networking. They discuss the formidable challenges of transitioning from on-premises to the cloud, especially in regulated healthcare environments. Listeners will be intrigued by their stories on adapting security measures, the surprising effectiveness of certain anti-patterns, and the hidden compliance hurdles faced during cloud migration, all while navigating the intricate landscape of AWS networks.

Feb 20, 2025 • 54min
Cloud Incident Response in Microsoft Azure
In this engaging discussion, security researcher Katie Knowles, a former Azure incident responder, dives into critical Azure security topics. She unpacks common incident response scenarios and the rising threat of LLM jacking, where attackers misuse authentication tokens. Katie shares insights on privilege escalation in Azure Key Vault and emphasizes the importance of secure role assignments. She also offers practical tips for developing an effective Azure incident response playbook, making Azure's intricate security landscape accessible to all.

18 snips
Feb 13, 2025 • 51min
AWS Multi-Account Security: What Netflix Learned
Join cloud security experts Patrick Sanders and Joseph Kjar from Netflix as they share their insights on securing AWS multi-account environments. They discuss why an identity-first approach is essential for security, tackling challenges like least privilege access and IAM role migrations. The duo emphasizes balancing security with developer efficiency, and they shed light on strategies for isolating cloud identities amidst complexities. Packed with practical tips, their conversation offers valuable lessons from Netflix's cloud security journey.

12 snips
Feb 4, 2025 • 58min
Cloud Security Detection & Response Strategies That Actually Work
Will Bengtson, VP of Security Operations at HashiCorp, dives into the complexities of cloud security. He explains how cloud incident response differs from on-prem solutions and reveals how quickly attackers exploit APIs. Will shares insights on building effective detection programs while highlighting detection blind spots in AWS and Azure. He also discusses the importance of collaboration in threat hunting and the evolving challenges in managing cloud security. Along the way, he reflects on personal growth and culinary favorites, adding a delightful twist to the conversation.