Scale to Zero - No Security Questions Left Unanswered

Scale To Zero

We know security is challenging, but a timely understanding of security is far more challenging! Scale to Zero is built for all the security professionals for helping them to be more privacy and security-sensitive. With this show, we hope to address all the security-related issues that are challenging to understand and resolve without the help of experts. We believed that a community space like Scale to Zero would make things a little bit simpler for everyone after we discovered the discomfort of constantly switching back and forth.

  1. eBPF, MCP Servers, and the Kernel-Level Future of AI Security | ft. Ammar Ekbote | Ep. 105 | ScaleToZero Podcast

    2D AGO

    eBPF, MCP Servers, and the Kernel-Level Future of AI Security | ft. Ammar Ekbote | Ep. 105 | ScaleToZero Podcast

    In this episode, we sit down with a veteran Security and Cloud Infra Leader to deconstruct the architecture of modern workload monitoring and the emerging risks of AI-driven connectivity. We dive deep into eBPF—the technology providing "invisible" observability—and the security implications of MCP (Model Context Protocol) servers in the enterprise.Whether you're an infra lead or a security engineer, this episode provides the technical depth to help you stay ahead of the curve. Also available on YouTube: https://youtu.be/iCfEJlgXFBU00:00 Teaser and Introduction04:12 Architectural differences between Agentless and Agent-based scanning07:50 Losing security signals in case of Agentless scanning09:23 Challenges of Agent-based scanning10:45 Vendor checklist for production release11:45 Noisy neighbour challenge and customer application14:52 Securing large agent-based vendor machines16:40 Use of eBPF for invisible workload monitoring19:17 Securing the eBPF21:00 Does eBPF solve the stability and performance risks?23:25 Security risks when LLMs use MCP servers27:16 Detect and Avoid MCP in an organizational environment32:32 Why use eBPF for security MCP?35:10 Using eBPF to run local servers in a secure way37:00 Can eBPF secure data leaks to AI models?41:19 Justifying stakeholders for using kernel-level security43:25 Evangelizing a security-first mindset44:50 Starting point for developer-led security using eBPF46:30 Learning recommendations47:10 Summary#eBPF #CloudSecurity #AISecurity #MCPServer #DevSecOps #AgentlessScanning #CloudInfrastructure #InfoSec #CybersecurityPodcast #LLMSecurity #KernelSecurity

    49 min
  2. AWS vs. GCP IAM Architecture & The Future of Security in 2026 | ft. Senior Security Engineer (CISSP) - Sneha Malshetti

    JAN 14

    AWS vs. GCP IAM Architecture & The Future of Security in 2026 | ft. Senior Security Engineer (CISSP) - Sneha Malshetti

    This episode is a masterclass in modern cloud architecture and the fast-evolving world of AI security. In episode 103, we sat down with a Senior Security Engineer (CISSP) to break down the architectural nuances of AWS vs. GCP IAM and how security roles are evolving in 2026. From mastering cross-account access to defining data perimeters for AI training models, this episode is a deep dive into the technical and strategic layers of cloud-native security. YouTube: https://youtu.be/Y_OCpI8LJb4 Transcript: https://www.scaletozero.com/episodes/aws-vs-gcp-iam-architecture-the-future-of-security-in-2026-with-sneha-malshetti-cissp/ Sneha Malshetti: https://www.linkedin.com/in/sneha-malshetti/ Fearless Organization: https://www.amazon.in/Fearless-Organization-Psychological-Workplace-Innovation/dp/1119477247TLS Handshake Deep Dive and decryption with Wireshark: https://www.youtube.com/watch?v=25_ftpJ-2ME Cloudanix: https://cloudanix.com/ 00:00 Introduction 04:30 Architectural differences between AWS and GCP IAM 08:40 Best practices to approach IAM in AWS and GCP 11:00 Achieving centralized identity federation for a consistent user experience 13:45 Manage cross-account access securely in AWS vs GCP 14:40 Balancing RBAC for large organizations 18:00 Automation and Auditing recommendations for IAM 21:42 Managing access for large organizations 23:55 Monitoring Privileged Access 27:20 Balancing Security and Speed 30:19 Data Perimeter boundaries and their importance 34:20 How have security functions transformed in the AI world? 36:55 Will AI replace Humans? 38:15 Managing sensitive data used to train AI models 42:42 Security Trends in 2026 45:48 Summary 46:48 Learning Recommendation

    49 min

About

We know security is challenging, but a timely understanding of security is far more challenging! Scale to Zero is built for all the security professionals for helping them to be more privacy and security-sensitive. With this show, we hope to address all the security-related issues that are challenging to understand and resolve without the help of experts. We believed that a community space like Scale to Zero would make things a little bit simpler for everyone after we discovered the discomfort of constantly switching back and forth.