1 hr

If Only All My Disasters Could Be Managed The Cloud Pod

    • Technology

Welcome to episode 259 of the Cloud Pod podcast – where the forecast is always cloudy! This week your hosts Justin, Matthew, and Jonathan and Ryan (yes, all 4!) are covering A LOT of information – you’re going to want to sit down for this one. This week’s agenda includes unnecessary Magic Quadrants, SecOps, Dataflux updates, CNAME chain struggles, and an intro into Phi-3 – plus so much more! 

Titles we almost went with this week:

GKE Config Sync or the Auto Outage for K8 Feature
If only all my disasters could be managed
The Cloud Pod builds a Rag Doll
Understanding Dataflux has given me reflux
Oracle continuing the trend of adding AI to everything even databases
A new way to burn your money on the cloud which isn’t even your fault
Google Gets a Magic Quadrant Participation Trophy
We’re All Winners to Magic Quadrant 
Don’t be a giant DNAME 

A big thanks to this week’s sponsor:
Big thanks to Sonrai Security for sponsoring today’s podcast
Check out Sonrai Securities’ new Cloud Permission Firewall. Just for our listeners, enjoy a 14 day trial at https://sonrai.co/cloudpod 
General News 
00:33 Dropbox dropped the ball on security, hemorrhaging customer and third-party info 


Dropbox has revealed a major attack on its systems that saw customers’ personal information accessed by unknown and unauthorized entities. 
The attack, detailed in a regulatory filing, impacted Dropbox Sign, a service that supports e-signatures similar to Docusign. 
The threat actor had accessed data related to all users of Dropbox Sign, such as emails and usernames, in addition to general account settings. 
For a subset of users, the threat actor accessed phone numbers, hashed passwords and certain authentication information such as API keys, OAuth tokens and multi-factor authentication.  
To make things *extra* worse – if you never had an account but received a signed document your email and name has also been exposed. Good times. 
Want to read the official announcement? You can find it here. 

03:06 Jonathan- “It’s unfortunate that it was compromised. It was their acquisition, wasn’t it – ‘HelloSign’ that actually had the defect, not their main product at least.”

05:44 VMware Cloud on AWS – here today, here tomorrow 


Last week at recording time Matt mentioned the VMWare Cloud on AWS rumors on twitter that Broadcom was terminating. 
Hock Tan, President and CEO of Broadcom wrote a blog post letting you know that VMWare Cloud on AWS is Here today, and here tomorrow. 
He says the reports have been false, and contends that the offering would be going away forcing unnecessary concern for their loyal customers who have used the se

Welcome to episode 259 of the Cloud Pod podcast – where the forecast is always cloudy! This week your hosts Justin, Matthew, and Jonathan and Ryan (yes, all 4!) are covering A LOT of information – you’re going to want to sit down for this one. This week’s agenda includes unnecessary Magic Quadrants, SecOps, Dataflux updates, CNAME chain struggles, and an intro into Phi-3 – plus so much more! 

Titles we almost went with this week:

GKE Config Sync or the Auto Outage for K8 Feature
If only all my disasters could be managed
The Cloud Pod builds a Rag Doll
Understanding Dataflux has given me reflux
Oracle continuing the trend of adding AI to everything even databases
A new way to burn your money on the cloud which isn’t even your fault
Google Gets a Magic Quadrant Participation Trophy
We’re All Winners to Magic Quadrant 
Don’t be a giant DNAME 

A big thanks to this week’s sponsor:
Big thanks to Sonrai Security for sponsoring today’s podcast
Check out Sonrai Securities’ new Cloud Permission Firewall. Just for our listeners, enjoy a 14 day trial at https://sonrai.co/cloudpod 
General News 
00:33 Dropbox dropped the ball on security, hemorrhaging customer and third-party info 


Dropbox has revealed a major attack on its systems that saw customers’ personal information accessed by unknown and unauthorized entities. 
The attack, detailed in a regulatory filing, impacted Dropbox Sign, a service that supports e-signatures similar to Docusign. 
The threat actor had accessed data related to all users of Dropbox Sign, such as emails and usernames, in addition to general account settings. 
For a subset of users, the threat actor accessed phone numbers, hashed passwords and certain authentication information such as API keys, OAuth tokens and multi-factor authentication.  
To make things *extra* worse – if you never had an account but received a signed document your email and name has also been exposed. Good times. 
Want to read the official announcement? You can find it here. 

03:06 Jonathan- “It’s unfortunate that it was compromised. It was their acquisition, wasn’t it – ‘HelloSign’ that actually had the defect, not their main product at least.”

05:44 VMware Cloud on AWS – here today, here tomorrow 


Last week at recording time Matt mentioned the VMWare Cloud on AWS rumors on twitter that Broadcom was terminating. 
Hock Tan, President and CEO of Broadcom wrote a blog post letting you know that VMWare Cloud on AWS is Here today, and here tomorrow. 
He says the reports have been false, and contends that the offering would be going away forcing unnecessary concern for their loyal customers who have used the se

1 hr

Top Podcasts In Technology

Apple Events (video)
Apple
Acquired
Ben Gilbert and David Rosenthal
Lex Fridman Podcast
Lex Fridman
Apple Events (audio)
Apple
Search Off the Record
Google
How to Fix the Internet
Electronic Frontier Foundation (EFF)