


Breaking and Building Serverless Application Security
Nov 21, 2021
•
DataDog

Challenges with Building Serverless Applications at Scale
Nov 14, 2021
•
Epsagon

Security Governance and Compliance in Serverless Applications
Nov 7, 2021
•
Seiso

Building Applications with Zero Trust Principles
Oct 31, 2021
•
Figma

Threat Detection and Incident Response in Cloud
Oct 24, 2021
•
Resilience

What is SaaS Security Posture Management (SSPM)?
Oct 21, 2021
•
Resilient Cyber

What is Cloud Native Application Protection (CNAPP)?
Oct 17, 2021
•
Accurics

Implementing Cloud Security Tools the Right way
Oct 10, 2021
•
Dassana

Data Security and it’s Challenges in Cloud
Oct 3, 2021
•
Dasera

Application Security Engineer Skills
Sep 26, 2021
•
Purple

Threat Analyst Skills
Sep 24, 2021
•
Cyberwox Academy

From University to a Security Engineer at Atlassian
Sep 19, 2021
•
Atlassian

Getting an Entry Level GRC Role
Sep 16, 2021
•
Simply Cyber

From Executive Assistant to Head of Security
Sep 12, 2021
•
PagerDuty

Skills needed for an Associate Cloud Security Engineer
Sep 5, 2021
•
Best Buy

Cloud Hacking eSports | Ultimate Hacking Championship
Aug 29, 2021
•
Ultimate Hacking Championship

Network Security in Cloud Native World
Aug 26, 2021
•
AccuKnox

Migrating from Monolith to Cloud Native
Aug 22, 2021
•
CySense

What is a Security Data Lake?
Aug 8, 2021
•
Snowflake
Building Observability Platform for Scale
Aug 3, 2021
•
Atlassian

Cloud Native Security: OpenTelemetry & Tracing Explained
Aug 1, 2021
•
LightStep

What is Cyber Resilience in Cloud?
Jul 25, 2021
•
Resilient Cyber

Managing Threats in AWS using AWS Tools
Jul 21, 2021
•
AWS

Cloud Security RoadMap
Jul 18, 2021
•
Summit Route

Comparing Cloud Security Tools: CWPP vs CSPM vs CASB
Jul 11, 2021
•
Orca Securit

Cloud Infrastructure Security at Scale
Jul 4, 2021
•
Netflix

Podcast Collaboration: Hacker Valley Studio
Jun 27, 2021
•
Hacker Valley Studio

Finding Bugs in Google Cloud
Jun 20, 2021
•
Best Buy

Hacker Stories from the Internet
Jun 13, 2021
•
Darknet Diaries

21 yrs in Cybersecurity: Challenges THEN & NOW
Jun 10, 2021
•
YL Ventures

Finding and Fixing Security Bugs in Google Cloud
Jun 6, 2021
•
Truffle Security

Attacking and Defending Managed Kubernetes Clusters
May 30, 2021
•
Darkbit

Kubernetes Runtime Threat Detection and Response – Falco, Sysdig
May 23, 2021
•
sysdig

Start here for Kubernetes Security
May 16, 2021
•
Trend Micro

Risk Analysis of Kubernetes Security
May 9, 2021
•
Snowflake

Kubernetes (Goat) Vulnerable by Design
May 2, 2021
•
Miro

CISO PERSPECTIVE SERIES: LINKEDIN CISO
Apr 25, 2021
•
Linkedin

Building Threat Detection for your Cloud Environment
Apr 18, 2021
•
Microsoft

Cloud Governance using Infrastructure as Code
Apr 11, 2021
•
env0

Kubernetes Security Explained for those starting today!
Apr 5, 2021
•
Google Cloud

Getting Infrastructure as Code (IaC) Security Culture right!
Mar 28, 2021
•
Indeni

Azure Security Best Practices for Cloud Architects
Mar 21, 2021
•
John Savill

Infrastructure as Code Security
Mar 14, 2021
•
Bridgecrew

INCIDENT RESPONSE IN AWS CLOUD
Mar 7, 2021
•
AWS

How to become a Cloud Security Engineer
Feb 28, 2021
•
ByteChek

Kubernetes Security at Scale in A CI/CD Pipeline
Feb 21, 2021
•
refactr

Container Security for AWS
Feb 14, 2021
•
Falcon’s View Consulting

CISO Challenges in 2021
Feb 10, 2021
•
Signal Sciences

Cloud Security in $25 Billion dollar Company
Feb 7, 2021
•
Siemens USA

Security Chaos Engineering Experiments for Beginners
Jan 31, 2021
•
Capital One

Red Team in Cloud
Jan 24, 2021
•
Atlassian

What is Infrastructure as Code Security?
Jan 17, 2021
•
BridgeCrew

Cloud Security Testing in AWS
Jan 10, 2021
•
Securing

How to become a Cloud Security Architect in 2021
Jan 3, 2021
•
United Airlines