All Episodes

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
post

CONTINUOUS KUBERNETES SECURITY IN 2023

2023 What Kubernetes Security Looks Like Today Series- DevSecOps

IS THERE DEVSECOPS IN CLOUD?

How to Build a Modern Cyber Security Program in 2023

HOW TO BUILD A CLOUD SECURITY PROGRAM – MEDIA INDUSTRY

How to Accelerate your AWS Security Maturity in 2023

How to Build AWS Multi-Account Infrastructure with Security and Speed

HOW TO GET FEDRAMP CERTIFIED IN AWS

HOW TO BUILD A CLOUD SECURITY PROGRAM WITH CONTAINERS

AWS Cloud Penetration Testing Explained with Example

AWS Goat – Cloud Penetration Testing

Getting Started with Hacking AWS ECS!

Getting Started with Hacking AWS CLOUD!

Cloud security podcast 2022 logo

AWS Reinvent 2022 – RECAP for Cloud Security Professionals!

AWS EKS EXPLAINED!

Story of a Cloud Architect & Blurry Lines of Control with AWS

BECOME A CLOUD SECURITY ARCHITECT IN 2023

AWS Threat Detection for NOT SO COMMON AWS Services Explained

RANSOMWARE & SUPPLY CHAIN ATTACKS IN AWS

HOW TO BECOME A CLOUD NATIVE SECURITY ARCHITECT

Compliance as Code in Kubernetes

Software Signing for Kubernetes Supply Chain & Everybody Else

KUBERNETES BEST PRACTICES 2022

Building Blocks of Cloud Security Program

Cloud Security Monitoring in Modern Security Security Stack

API Security Best Practice 2022

Hacker Summer Camp 2022 : The Cloud Security Edition

How to Threat Model the Digital Supply Chain in Cloud

HOW TO SECURE Container environment FOR FINANCIAL SERVICES

Fundamentals of AWS Cloud Security Assessment

HOW TO SECURE AWS CLOUD ENVIRONMENT FOR HEALTHCARE

Zero Trust the Triple Paradox

Building & Scaling AWS Security Guardrails

FIXING THAT BROKEN DIGITAL SUPPLY CHAIN

3 THINGS THAT BROKE THE DIGITAL SUPPLY CHAIN

Digital Transformation – Are we there yet?

CISO Perspective: Sean Catlett, Slack CISO

CyberSecurity Asset Management for the Modern Security Stack

Azure Security Fundamentals – Level 200

Confidential Computing in Azure Explained

Azure Cloud Security Architecture

Azure Security Fundamentals – Level 1

Finding Security Holes in Azure Services

Azure Kubernetes Service (AKS) Security Explained

Azure Security Fundamentals – Zero Trust with Azure AD

How to Secure Cloud Managed Kubernetes

Kubernetes Security Best Practices in 2022

Manage Privileged Access for Kubernetes & Cloud

How to become a Cloud Native Security Engineer

Service Mesh Security Explained!

Scaling a Practical AWS Asset Management Program

Threat Hunting in AWS

What is SBOM, iBOM?

Security for AI/ML Models in AWS

Building Google Cloud Security Products

Google Cloud Security Fundamentals – Level 2

Google Cloud Security Fundamentals

Red Team in Google Cloud

How to Automate Security in Google Cloud?

Authorization Control for Enterprise in Cloud

AWS IAM Getting Started

Secret Management for Modern Apps Explained

CISO in a Cloud World in 2022

Building Modern Identity (IAM) Roadmap for Cloud

Building Scalable Authorization in Cloud Native Apps

Andrew Krug

Breaking and Building Serverless Application Security

Ran Ribenzaft

Challenges with Building Serverless Applications at Scale

Jon Zeolla

Security Governance and Compliance in Serverless Applications

Maximilian Burkhardt

Building Applications with Zero Trust Principles

Nathan Case

Threat Detection and Incident Response in Cloud

Chris Hughes

What is SaaS Security Posture Management (SSPM)?

Om Moolchandani

What is Cloud Native Application Protection (CNAPP)?

Gaurav Kumar

Implementing Cloud Security Tools the Right way

David McCaw

Data Security and it’s Challenges in Cloud

Tanya Janca

Application Security Engineer Skills

Abisola Dayspring (Day) Johnson

Threat Analyst Skills

Kaif Ahsan

From University to a Security Engineer at Atlassian

Gerald Auger

Getting an Entry Level GRC Role

Lisa Hall

From Executive Assistant to Head of Security

Zinet Kemal

Skills needed for an Associate Cloud Security Engineer

Igor Rincon and Magno Logan

Cloud Hacking eSports | Ultimate Hacking Championship

Karthik Prabhakar

Network Security in Cloud Native World

John Kinsella

Migrating from Monolith to Cloud Native

Omer Singer

What is a Security Data Lake?

Colby Funnel

Building Observability Platform for Scale

Ted Young

Cloud Native Security: OpenTelemetry & Tracing Explained

Chris Hughes & Dr. Nikki Robinson

What is Cyber Resilience in Cloud?

Ely Khan

Managing Threats in AWS using AWS Tools

Scott Piper

Cloud Security RoadMap

Patrick Pushor

Comparing Cloud Security Tools: CWPP vs CSPM vs CASB

Srinath Kuruvadi

Cloud Infrastructure Security at Scale

Chris Cochran & Ronald Eddings

Podcast Collaboration: Hacker Valley Studio

Kat Traxler

Finding Bugs in Google Cloud

Jack Rhysider

Hacker Stories from the Internet

Andy Ellis

21 yrs in Cybersecurity: Challenges THEN & NOW

Dylan Ayrey

Finding and Fixing Security Bugs in Google Cloud

Brad Geesaman

Attacking and Defending Managed Kubernetes Clusters

Dan “POP“ Papandrea

Kubernetes Runtime Threat Detection and Response – Falco, Sysdig

Magno Logan

Start here for Kubernetes Security

Mark Manning

Risk Analysis of Kubernetes Security

Madhu Akula

Kubernetes (Goat) Vulnerable by Design

Geoff Belknap

CISO PERSPECTIVE SERIES: LINKEDIN CISO

Ashwin Patil

Building Threat Detection for your Cloud Environment

Ohad Maislish

Cloud Governance using Infrastructure as Code

Kelsey Hightower

Kubernetes Security Explained for those starting today!

Yoni Leitersdorf

Getting Infrastructure as Code (IaC) Security Culture right!

John Savill

Azure Security Best Practices for Cloud Architects

Barak Schoster Goihman

Infrastructure as Code Security

Toni de la Fuente

INCIDENT RESPONSE IN AWS CLOUD

Nicholas McLaren

How to become a Cloud Security Engineer

Michael Fraser

Kubernetes Security at Scale in A CI/CD Pipeline

Ben Tomhave

Container Security for AWS

Zane Lackey

CISO Challenges in 2021

Kurt John

Cloud Security in $25 Billion dollar Company

David Lavezzo

Security Chaos Engineering Experiments for Beginners

Brianna Malcolmson

Red Team in Cloud

Matt Johnson

What is Infrastructure as Code Security?

Pawel Rzepa

Cloud Security Testing in AWS

Sriya Potham

How to become a Cloud Security Architect in 2021

Monica Verma

Risk Management in Cloud Security

Dr. Sam Small

WHAT IS DIGITAL RISK PROTECTION & WHY IS IT IMPORTANT?

Matthew Fuller

AWS SECURITY USING OPEN SOURCE

Melissa Benua

WHAT THE HECK IS CI/CD?

Naomi Buckwalter

HOW TO PREPARE FOR GDPR IN AZURE CLOUD ENVIRONMENT

Casey Ellis

HOW TO START IN BUG BOUNTY IN 2020

Daniel Miessler

CONTINUOUS MONITORING FOR CONTROLS & VULNERABILITIES

Houston Hopkins

AWS SECURITY FOR LARGE REGULATED ENTERPRISE!

Caleb Sima

CISO Challenges in Cloud Security

Jerome Walter

WHAT IS SECURITY CHAOS ENGINEERING?

AJ Yawn

Security And Compliance in AWS Cloud

Alexandre Sieira

Identity & Cross Account Access Management in AWS Cloud

David O’Brien

WHAT IS AZURE IDENTITY MANAGEMENT?

Gaurav Kumar

DO YOU NEED A CLOUD SECURITY POSTURE MANAGEMENT (CSPM) ?

Darpan Shah

HOW TO BUILD SECURE ENVIRONMENTS IN GOOGLE CLOUD

Nicholas Hughes

HOW TO BUILD SECURE ENVIRONMENTS IN MICROSOFT AZURE?

Clint Gibler

HOW TO CREATE AN EFFECTIVE CYBER SECURITY TEAM?

Tanya Janca

APPLICATION SECURITY APPSEC 101

Aaron Rinehart

Getting Started with Chaos Engineering

Parul Kharub

CLOUD SECURITY IN A OPERATIONAL TECHNOLOGY VS INFORMATION TECHNOLOGY

Abbas Kudrati

HOW TO BECOME A SUCCESSFUL CISO IN 2020

Darpan Shah

HOW TO DO GOOGLE CLOUD SECURITY ? – THE 2020 EDITION

Chris Hughes

HOW TO BECOME A CLOUD SECURITY ENGINEER in 2020

Edwin Kwan

BUILDING AN ENGINEERING SECURITY CULTURE

Alannah Guo

Women in Cybersecurity

Francesco Cipollone

Google Cloud Security – how does google cloud work?

Graeme Cantu-Park

What is GOOD COMPANY CULTURE?

Alissa Knigth

What is a Connected Car? & How to secure it’s API?

Tim Heckman

What is SRE & when do you need it?

Taylor Hersom

NIST CyberSecurity Metrics for the Board

Chris Cochran & Ronald Eddings

Talking Cloud Security with Hacker Valley Studio

Abhay Bhargav

SERVERLESS SECURITY BEST PRACTICES

Merritt Baer

HOW TO SECURE AND IMPROVE YOUR CLOUD ENVIRONMENT

Michael Fuller

How Atlassian manages Risk and Compliance

Cloud-Security-Podcast-logo

CORONAVIRUS & CyberSecurity & Isolation Life – Ashish Rajan

Fareedah Shaheed

HOW TO BUILD CYBERSECURITY TRAINING PROGRAM

William Bengtson

Cloud Native Security

David Linthicum

Multi Cloud Strategy

Taylor Hersom

Data governance best practices

Michael Hausenblas

Container Security 101 in AWS

Ashwin Patil

Threat Intelligence in Azure

David O’Brien

Microsoft Ignite 2020 Sydney – Security Releases

Francesco Cipollone

Is public cloud secure?

Stu Hirst

Cloud Security in a world of multi public cloud

Cloud Security TV

CLOUD SECURITY IN JAPAN 2020

Tanya Janca

AZURE vs AWS from a cybersecurity lens

Jay Kelath

Cloud Security journey of Dow Jones post the AWS Cloud Breach

Jane Frankland

How to attract and retain more women engineers?

Vandana Verma

Cloud Security and Infosec girls

Arjen Schwarz

AWS Re-invent 2019 Security Announcements – The DevSecOps in AWS edition

Recommend a topic

Partner with us

Join the team