Back to OS
Built by Miscreants
Home
Course & Training
Seasons
Season Five
Originals
Season Four
Season Three
Season Two
Season One
Channels
Hot Takes
AI in Cloud Security
AWS Security
Azure Security
CISO/ CSO Interviews
Cloud Native Security Series
Cloud Security Careers
Cloud Security Engineering Series
Cloud Security Series
Container Security Series
Data Security
DevSecOps/ Appsec Episode
Google Cloud Security
Identify and Access Management (IAM)
Kubernetes Security
Offensive Security Cloud
Red Team in Cloud Series
Serverless Series
Where To Find Us
Spotify
Apple Podcast
YouTube
LinkedIn
Google Podcast
Twitter
Amazon Podcast
Overcast
Newsletter
About the podcast
Partner with us
AWS Security
Watch videos about AWS security!
The Role of Cloud Security Research in 2024
Oct 2, 2024
•
Wiz
Streamlining AWS Cloud Access Controls for Human and Non Human Identities - AWS IAM Access Analyzer
Aug 2, 2024
•
AWS
Cloud Native Strategies from a FinTech CISO
Jul 30, 2024
•
checkpoint.com
Fixing Cloud Security with AWS Lambda
Jul 23, 2024
•
Roku
Real-World Cloud Security Challenges and Solutions Explained for 2024
May 21, 2024
•
Chris Farris & Rich Mogull
AWS IAM Access Analyzer Explained
Mar 5, 2024
•
AWS
AWS Cloud Security Strategies for 2024
Feb 28, 2024
•
AWS
Balancing Efficiency & Security: AI’s Transformation of Legal Data Analysis
Feb 23, 2024
•
LexisNexis
Cloud Security Programs with AWS Security Services
Feb 22, 2024
•
Multicloud strategy for AWS and GCP
Jan 19, 2024
•
Digital Turbine
Build an Effective AWS Cloud Security Program in 2024
Jan 5, 2024
•
AWS ReInvent 2023 - All Security highlights & Announcements
Dec 6, 2023
•
Threat Detection for not so common Cloud Services
Nov 10, 2023
•
Sysdig
Preventative Cloud Security Explained!
Sep 7, 2023
•
Kivera
Network Pentest 2.0 : The Cloud Pentest Revolution
Aug 23, 2023
•
Seth Art, BishopFox
High Performance Computing in AWS Explained !
Aug 16, 2023
•
Amazon Web Services (AWS)
HOW TO BUILD A CLOUD SECURITY PROGRAM – MEDIA INDUSTRY
Mar 6, 2023
•
Warner Bros Discovery
How to Accelerate your AWS Security Maturity in 2023
Feb 26, 2023
•
AWS
How to Build AWS Multi-Account Infrastructure with Security and Speed
Feb 21, 2023
•
Netflix
HOW TO GET FEDRAMP CERTIFIED IN AWS
Feb 14, 2023
•
AWS
AWS Cloud Penetration Testing Explained with Example
Jan 30, 2023
•
Bishop Fox
AWS Goat – Cloud Penetration Testing
Jan 24, 2023
•
INE
Getting Started with Hacking AWS ECS!
Jan 12, 2023
•
LightSpin
AWS Reinvent 2022 – RECAP for Cloud Security Professionals!
Dec 14, 2022
•
AWS
BECOME A CLOUD SECURITY ARCHITECT IN 2023
Nov 13, 2022
•
Vectra
AWS Threat Detection for NOT SO COMMON AWS Services Explained
Nov 10, 2022
•
Clavis Security
RANSOMWARE & SUPPLY CHAIN ATTACKS IN AWS
Nov 6, 2022
•
VMWare
Hacker Summer Camp 2022 : The Cloud Security Edition
Aug 28, 2022
•
Cloud Security
How to Threat Model the Digital Supply Chain in Cloud
Aug 21, 2022
•
Twilio
Fundamentals of AWS Cloud Security Assessment
Jul 30, 2022
•
Security Risk Advisors
HOW TO SECURE AWS CLOUD ENVIRONMENT FOR HEALTHCARE
Jul 20, 2022
•
AllScripts
Building & Scaling AWS Security Guardrails
Jul 4, 2022
•
Square
Scaling a Practical AWS Asset Management Program
Mar 27, 2022
•
JupiterOne
Threat Hunting in AWS
Mar 20, 2022
•
Hunters
What is SBOM, iBOM?
Mar 13, 2022
•
Bridgecrew
Security for AI/ML Models in AWS
Mar 6, 2022
•
AWS
What is Cyber Resilience in Cloud?
Jul 25, 2021
•
Resilient Cyber
Managing Threats in AWS using AWS Tools
Jul 21, 2021
•
AWS
Cloud Security RoadMap
Jul 18, 2021
•
Summit Route
Comparing Cloud Security Tools: CWPP vs CSPM vs CASB
Jul 11, 2021
•
Orca Securit
Cloud Infrastructure Security at Scale
Jul 4, 2021
•
Netflix
AWS SECURITY USING OPEN SOURCE
Nov 15, 2020
•
CloudSploit
AWS SECURITY FOR LARGE REGULATED ENTERPRISE!
Oct 11, 2020
•
CapitalOne
Identity & Cross Account Access Management in AWS Cloud
Sep 13, 2020
•
Tenchi Security
HOW TO SECURE AND IMPROVE YOUR CLOUD ENVIRONMENT
Apr 12, 2020
•
AWS
Cloud Security in a world of multi public cloud
Feb 2, 2020
•
JustEat
CLOUD SECURITY IN JAPAN 2020
Jan 26, 2020
•
AZURE vs AWS from a cybersecurity lens
Jan 19, 2020
•