239 episodes

Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud.

We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security.

We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Facebook and Twitter with over 150 people watching and asking questions and interacting with the Guest.

Cloud Security Podcast Cloud Security

    • Technology
    • 5.0 • 52 Ratings

Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud.

We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security.

We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Facebook and Twitter with over 150 people watching and asking questions and interacting with the Guest.

    eBPF - Kubernetes Network Security without the Blind Sides!

    eBPF - Kubernetes Network Security without the Blind Sides!

    eBPF is recent graduate in the CNCF family and this means that the world of Cloud and Kubernetes, networking looks very different with more security capabilities. Cilium the project from Isovalent has been gaining traction for network security for kubernetes as blindsides have been called out in the managed kubernetes deployments. This episode was recorded at KubeCon NA with Thomas Graf from Isovalent to share what the blindsides are and why eBPF provides better network security capability for kubernetes deployments of any scale.



    Guest Socials: Thomas's Linkedin ⁠(⁠@ThomasGraf⁠⁠)⁠

    Podcast Twitter - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠

    If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:

    - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Newsletter ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠

    - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security BootCamp⁠⁠⁠



    Questions asked:

    (00:00) Introduction

    (03:42) A bit about Thomas

    (04:11) Traditional Networking in Kubernetes

    (06:52) What is Cilium?

    (07:52) What is eBPF?

    (08:46) What do people use Cilium for?

    (11:31) Starting with network security in Kubernetes

    (13:02) Complexities with Scale

    (16:02) How do projects graduate?

    (17:02) The eBPF documentary

    (17:27) Opensource to Company

    (18:52) Practitioner to Founder

    (19:57) Building an open source project

    (21:13) The Fun Questions!



    You can check out the The eBPF Documentary here

    • 23 min
    Attack Path Analysis for Better Kubernetes Security

    Attack Path Analysis for Better Kubernetes Security

    Kubernetes security cannot just be Kubernetes but it is like security of a datacenter within another datacenter. In this episode with Tim Miller we spoke about CNAPP, how to approach kubernetes security.



    Thank you to our episode sponsor ⁠Outshift by Cisco



    Guest Socials: Tim's Linkedin ⁠(⁠@timothyemiller⁠)⁠

    Podcast Twitter - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠

    If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:

    - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Newsletter ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠

    - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security BootCamp⁠⁠



    Questions asked:

    (00:00) Introduction

    (02:42) A bit about Tim Miller

    (03:35) What is CNAPP?

    (04:30) Traditional Kubernetes Security

    (05:18) Where to put a CNAPP?

    (06:20) CSPM vs CNAPP

    (09:00) Attack Path Analysis

    (11:05) Kubernetes Attack Path

    (12:43) The team you need

    (14:06) Resources to learn more

    (16:24) Fun Question

    • 21 min
    Secure your SaaS applications like this!

    Secure your SaaS applications like this!

    SaaS Applications support large companies, small startups. We inevitably accumulate SAAS applications to manage our employees, payroll, communication with things like Workday, Slack, Salesforce and now even things like ChatGPT. But how do you find out what you have and if they are secure. We spoke about all things SSPM with Max Feldman who has done Product Security for years at companies like Slack, Salesforce and now AppOmni.



    Thank you to our episode sponsor AppOmni

    You can get a copy of their SaaS Security Posture Management Report 2023 here

    Guest Socials: Max's Linkedin ⁠(@maxfeldman14)⁠

    Podcast Twitter - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠

    If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:

    - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Newsletter ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠

    - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security BootCamp⁠



    Questions asked:

    (00:00) Introduction

    (04:20) A bit about Max

    (04:48) What is a SaaS application?

    (05:45) What is SSPM?

    (09:33) When to consider a SSPM?

    (15:45) SaaS and the Cloud

    (16:39) SaaS Attack Surface

    (19:34) CASB vs SSPM

    (24:00) Is ChatGPT a SaaS application?

    (25:07) SSPM vs CSPM + CNAPP

    (27:33) SSO and Onboarding

    (29:21) Starting a SaaS Security Program

    (36:48) Challenges with SaaS Security Program

    (41:50) Where you can find Max!

    • 42 min
    Threat Detection for not so Common Cloud Services

    Threat Detection for not so Common Cloud Services

    Threat detection is often limited to popular cloud services, so whats happening to all the "not so popular or commonly known" cloud services in your environment? We are speaking to Suresh Vasudevan, CEO of Sysdig about challenges typically companies find with this space and what should be the approach for threat detection. If you feel you are looking at threats from all cloud services you might want to hear this episode to know you actually are.Thank you to our episode sponsor Vanta and Sysdig

    You can find out more about Sysdig here!

    Find out more about Vanta here!



    Guest Socials: Suresh's Linkedin (@suvasudevan)

    Podcast Twitter - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠

    If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:

    - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Newsletter ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠

    - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security BootCamp



    Questions asked:

    (00:00) Introduction

    (03:41) A bit about Suresh

    (05:14) How was threat detection done traditionally?

    (07:33) How does threat detection translate to cloud?

    (08:47) Uncommon services attack vector examples

    (11:00) Uncommon services explained

    (11:31) Problems with threat detection in cloud

    (16:53) How to approach prioritisation?

    (19:48) Bridging Cloud and Applications



    Resources discussed during the episode!

    LabRatAmberSquidScarleteelThe 2023 Global Threat Research

    • 34 min
    How to Escape Clusters in a Managed Kubernetes Cluster?

    How to Escape Clusters in a Managed Kubernetes Cluster?

    Not Escaping Containers but escaping Clusters - Managed Kubernetes distributions such as Amazon EKS, Google Kubernetes Engine (GKE) and Azure Kubernetes Service (AKS) attack vectors can allow you to reach the underlying AWS Account etc. In conversation with Christophe Tafani-Dereeper & Nick Frichette, from Datadog on how this is possible in Amazon EKS and achieving potentially the same in GKE & AKS too.



    Thank you to our episode sponsor Sagetap



    Guest Socials: Nick's and Christophe's Linkedin (⁠⁠⁠⁠⁠⁠⁠⁠⁠Nick Frichette + Christophe Tafani-Dereeper)

    Podcast Twitter - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠

    If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:

    - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Newsletter ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠

    - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security BootCamp

    Questions asked:
    (00:00) Introduction

    (04:11) A bit about Christophe

    (04:37) A bit about Nick

    (05:03) What is managed Kubernetes?

    (06:26) Security of managed Kubernetes

    (09:02) Comparison between different managed Kubernetes

    (10:41) Service accounts and managed Kubernetes

    (14:22) What is container escape?

    (18:20) IMDSv2 for EKS

    (19:51) IMDSv2 in EKS vs AKES and GKE

    (22:01) Benchmark compliance for Kubernetes architecture

    (24:49) Low hanging fruits for container escape

    (27:17) Shared responsibility for managed Kubernetes

    (29:34) Fargate for Managed Kubernetes

    (32:00) Different ways to run containers

    (33:37) Escaping Managed Kubernetes cluster

    (38:39) Find more about this attack path

    (42:38) Escalation priviledge in EKS cluster

    (44:19) Reducing the Kubernetes attack service

    (44:58) MKAT for Kubernetes Security

    (48:23) Preventing AWS AuthConfig

    (50:11) Propagation Security

    (54:55) The fun section

    (57:47) Resources for latest Kubernetes updates



    Resources spoken about during the episode

    Nick Frichette's Blog - Hacking the Cloud

    Christophe Tafani-Dereeper' Blog

    Corey Quinn's - 17 ways to run containers on AWS

    MKAT

    cloudseclist newsletter

    • 59 min
    Have I lost my Secrets?

    Have I lost my Secrets?

    You know that feeling when you are unsure if you AWS secret that leaked is still available for use. There is no easy way to check this apart from looking in AWS to see if anyone used it. Turns out there could be another way.We have Ziad Ghalleb from GitGuardian to share free tool they released to help people look up if their secret was exposed on Github



    Thank you to our episode sponsors GitGuardian and Sysdig



    Guest Socials: Ziad's Linkedin (@ghallebziad)

    Podcast Twitter - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠

    If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:

    - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Newsletter ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠

    - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security BootCamp⁠

    Questions asked:
    (00:00) Introduction

    (04:53) A bit about Ziad

    (05:47) What are secrets?

    (07:37) Has my secret leaked

    (08:46) How would users know?

    (10:31) Whats the risk?

    (15:43) What do orgs do for secrets?

    (18:01) Keeping tab on your secrets

    (20:33) Secrets management maturity

    (22:43) Scaling Secrets management program

    (25:20) Where to learn more ?



    Resources spoken about during the episode

    hasmysecretleaked

    Secrets Detection Learning Center

    • 29 min

Customer Reviews

5.0 out of 5
52 Ratings

52 Ratings

mvelasco07 ,

Great show!

Cloud Security Podcast has quickly become a favorite in my feed! I’m consistently impressed by the engaging conversations, insightful content, and actionable ideas. I truly learn something every time I listen!

gblind8 ,

Insightful questions I’m curious to know the answer to

If you’re looking to hear from professionals in the field from a spectrum of experience, I would highly recommend this podcast. Some interview guests on other podcasts are difficult to relate to because they’re outliers. In this podcast, you’ll hear from guests that you can tangibly aspire to.

Kapil CSP ,

Best in class Cloud Security Updates

Over the last few years, podcasts have grown from a fringe media to one of the most popular ways to get news and information. For those in the know, or those who need to know, cloud security podcast hosted by Ashish is far best what I came across. Ashish is thought leader in cloud industry. With this in mind, he is one of best editor that have compiled a list of over hundreds of cloud security podcasts, To keep up with the latest news, trends, best practices, and to hear from the top minds in the industry, I highly recommend giving these a listen.

Top Podcasts In Technology

Jason Calacanis
Lex Fridman
The New York Times
Ben Gilbert and David Rosenthal
NPR
Jack Rhysider

You Might Also Like

David Spark, Mike Johnson, and Andy Ellis
CISO Series
Massive Studios
Amazon Web Services
Johannes B. Ullrich
N2K Networks