
Cloud Security Podcast
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud.
We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security.
We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Facebook and Twitter with over 150 people watching and asking questions and interacting with the Guest.
Latest episodes

Jul 23, 2024 • 21min
Fixing Cloud Security with AWS Lambda
Security expert Lily Chau discusses AWS Lambda for cloud security, auto-remediation, IAM roles, and challenges with CSPM. They cover cultural shifts, high-impact playbooks, and monitoring CloudTrail logs for security. Also, they talk about preventing subdomain takeovers, using Terraform for security, and a favorite restaurant in San Francisco.

Jul 16, 2024 • 22min
What is confidential computing? Explained for 2024
Zvonko Kaiser, Nvidia's Principal Systems Software Engineer, discusses confidential computing, secure enclaves, and attestations. He highlights the importance of GPUs in enhancing AI workloads and the transition to confidential containers for data protection. The podcast explores threat models, industry sectors utilizing confidential computing, and the value of isolation and attestation in cloud security.

Jul 9, 2024 • 28min
The Evolution of Infrastructure as Code so far - 2024 Edition
Armon Dadgar, Co-Founder and CTO at HashiCorp, illuminates his journey co-creating Terraform and tackling cloud complexities. He highlights the evolution of Infrastructure as Code (IaC) and stresses the importance of platform teams for large enterprises. Armon discusses the critical role of standardization and lifecycle management for cloud security. The conversation dives into the challenges of automation, including machine identity management, and the influence of generative AI on IaC practices, all while emphasizing community contributions to open-source initiatives.

Jul 4, 2024 • 23min
What is AI-SPM?
Dan Benjamin, Head of Data, Identity and AI Security at Prisma Cloud, discusses the new AI-SPM category, building AI and data inventories, understanding AI access, and the role of DSPM in effective AI security controls. They compare AISPM vs CSPM, tackle data security in the world of AI, and highlight the maturity curve for CISOs to consider.

Jun 25, 2024 • 22min
Creating Effective Sigma Rules with AI
Dave Johnson, Senior Threat Intelligence Advisor at Feedly and ex-FBI agent, discusses using large language models to create Sigma rules for threat detection. He highlights the challenges and benefits of employing AI in this process, emphasizing prompt chaining and RAG systems. The conversation touches on the importance of specific inputs and experimenting with dev environments for better security threat detection.

6 snips
Jun 14, 2024 • 23min
What is the future of security operations with AI in 2024?
Ely Kahn, VP of Cloud Security and AI at SentinelOne, discusses the shift to decentralized SOC operations, increasing cloud security complexity, and the future impact of AI on Cloud Security in 2024. Topics include evolving threat landscapes, SOAR, skillset changes, and a fun section covering personal interests.

May 31, 2024 • 31min
Cloud Native Security Strategies for 2024
Is having a CSPM enough for Cloud Security? At RSA Conference 2024, Ashish sat down with returning guest Jimmy Mesta, Co-Founder and CTO of RAD Security, to talk about the complexities of Kubernetes security and why sometimes traditional Cloud Security Posture Management (CSPM) falls short in a Kubernetes-centric world.
We speak about the significance of behavioural baselining, the limitations of signature-based detection, the role of tools like eBPF in enhancing real-time security measures and the importance of proactive security measures and the need for a paradigm shift from reactive alert-based systems to a more silent and efficient operational model.
Guest Socials: Jimmy's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(03:12) A bit about Jimmy Mesta
(03:48) What is Cloud Native Security?
(05:15) How is Cloud Native different to traditional approach?
(07:37) What is eBPF?
(09:12) Why should we care about eBPF?
(11:51) Separating the signal from the noise
(13:48) Challenges on moving to Cloud Native
(15:58) Proactive Security in 2024
(17:02) Whose monitoring Cloud Native alerts?
(23:10) Getting visibility into the complexities of Kubernetes
(24:24) Skillsets and Resources for Kubernetes Security
(27:54) The Fun Section
Resources spoke about the during the interview:
OWASP Kubernetes Top Ten

9 snips
May 21, 2024 • 59min
Real-World Cloud Security Challenges and Solutions Explained for 2024
Experienced cloud security experts Rich Mogull and Chris Farris share insights on effective cloud security strategies, moving beyond vulnerabilities. They discuss the Universal Threat Actor Model, practical steps in cloud environments, and managing a large volume of CSPM findings. The podcast also explores real-world security breaches, triaging, and automation of security responses, along with the speakers' diverse hobbies and favorite cuisines.

May 14, 2024 • 27min
Why Least Privilege Matters in Cloud Security?
Jeff Moncrief, a cloud security and identity management expert, discusses the challenges of implementing least privilege in cloud environments, the evolving role of identity management, and the importance of segmenting access across public clouds. The podcast highlights misconceptions surrounding identity roles and emphasizes the critical need to approach permissions management strategically and comprehensively.

Apr 30, 2024 • 20min
How is Kubernetes Network Security Evolving?
How is eBPF impacting Kubernetes Network Security? In this episode, recorded LIVE at Kubecon EU Paris 2024, Liz Rice, Chief Open Source Officer at Isovalent took us through the technical nuances of eBPF and its role in enabling dynamic, efficient network policies that go beyond traditional security measures. She also discusses Tetragon, the new subproject under Cilium, designed to enhance runtime security with deeper forensic capabilities. A great conversation for anyone involved in Kubernetes workload management, offering a peek into the future of cloud-native technologies and the evolving landscape of network security.
Guest Socials: Liz's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(01:46) A bit about Liz Rice
(02:11) What is eBPF and Cilium?
(03:24) SC Linux vs eBPF
(04:11) Business use case for Cilium
(06:37) Cilium vs Cloud Managed Services
(08:51) Why was there a need for Tetragon?
(11:20) Business use case for Tetragon
(11:32) Projects related to Multi-Cluster Deployment
(12:45) Where can you learn more about eBPF and Tetragon
(13:50) Hot Topics from Kubecon EU 2024
(15:07) The Fun Section
(15:35) How has Kubecon changed over the years?
Resources spoken about during the interview:
Cilium
Tetragon
eBPF