Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
…
continue reading
Welcome to "Crying Out Cloud," the monthly podcast that keeps you up to date with the latest cloud security news. Hosted by experts Eden Naftali and Amitai Cohen, each episode provides in-depth coverage of the most important vulnerabilities and incidents from the previous month. Tune in for insightful analysis and expert recommendations to help you safeguard your cloud infrastructure.
…
continue reading

1
AI-powered Security, Shared Fate, and an Archery Lesson with Dr. Anton Chuvakin
25:39
25:39
Play later
Play later
Lists
Like
Liked
25:39🎙️ Just dropped: Dr. Anton Chuvakin from Google Cloud, with legendary insights (and cloud security jokes).Eden Koby Naftali & Amitai Cohen sat down with Dr. Anton Chuvakin, Google Cloud's Office of the CISO, and the guy who made SIEM cool!What they got into ⬇️ 1) Why SOCs are broken (and full of toil)2) How to actually apply AI in security3) Why cl…
…
continue reading

1
EP228 SIEM in 2025: Still Hard? Reimagining Detection at Cloud Scale and with More Pipelines
27:09
27:09
Play later
Play later
Lists
Like
Liked
27:09Guest Alan Braithwaite, Co-founder and CTO @ RunReveal Topics: SIEM is hard, and many vendors have discovered this over the years. You need to get storage, security and integration complexity just right. You also need to be better than incumbents. How would you approach this now? Decoupled SIEM vs SIEM/EDR/XDR combo. These point in the opposite dir…
…
continue reading

1
EP227 AI-Native MDR: Betting on the Future of Security Operations?
23:58
23:58
Play later
Play later
Lists
Like
Liked
23:58Guests: Eric Foster, CEO of Tenex.AI Venkata Koppaka, CTO of Tenex.AI Topics: Why is your AI-powered MDR special? Why start an MDR from scratch using AI? So why should users bet on an “AI-native” MDR instead of an MDR that has already got its act together and is now applying AI to an existing set of practices? What’s the current breakdown in labor …
…
continue reading

1
EP226 AI Supply Chain Security: Old Lessons, New Poisons, and Agentic Dreams
24:39
24:39
Play later
Play later
Lists
Like
Liked
24:39Guest: Christine Sizemore, Cloud Security Architect, Google Cloud Topics: Can you describe the key components of an AI software supply chain, and how do they compare to those in a traditional software supply chain? I hope folks listening have heard past episodes where we talked about poisoning training data. What are the other interesting and unexp…
…
continue reading

1
EP225 Cross-promotion: The Cyber-Savvy Boardroom Podcast: EP2 Christian Karam on the Use of AI
24:46
24:46
Play later
Play later
Lists
Like
Liked
24:46Hosts: David Homovich, Customer Advocacy Lead, Office of the CISO, Google Cloud Alicja Cade, Director, Office of the CISO, Google Cloud Guest: Christian Karam, Strategic Advisor and Investor Resources: EP2 Christian Karam on the Use of AI (as aired originally) The Cyber-Savvy Boardroom podcast site The Cyber-Savvy Boardroom podcast on Spotify The C…
…
continue reading

1
UK Retail Breaches, SAP 0day, and CVE Troubles
29:05
29:05
Play later
Play later
Lists
Like
Liked
29:05🎙️ All you need to know from Ransomware to CVE Programs!☁️ Join Amitai Cohen and Eden Naftali as they break down the top stories in the cloud:- UK Retail Sector Hit by Ransomware (DragonForce & Scattered Spider)- SAP NetWeaver Vulnerability Exploited in the Wild- CVE Program Faces Major Backlog and Trust Issues…
…
continue reading

1
EP224 Protecting the Learning Machines: From AI Agents to Provenance in MLSecOps
30:40
30:40
Play later
Play later
Lists
Like
Liked
30:40Guest: Diana Kelley, CSO at Protect AI Topics: Can you explain the concept of "MLSecOps" as an analogy with DevSecOps, with 'Dev' replaced by 'ML'? This has nothing to do with SecOps, right? What are the most critical steps a CISO should prioritize when implementing MLSecOps within their organization? What gets better when you do it? How do we adap…
…
continue reading

1
Bug Bounty Secrets, Hacker Communities, and a Hit of Volleyball with Justin Gardner
40:24
40:24
Play later
Play later
Lists
Like
Liked
40:24🎙️ Listen to the biggest insights of bug bounty hunting with Justin Gardner 🚨 In this episode, Amitai Cohen and Eden Naftali are joined by none other than Justin, renowned bug bounty hunter and host of the Creative Thinking podcast (ctbbpodcast). Justin unpacks some of today's 🔥 topics: - Bug bounty disclosure challenges & trends - Security stories…
…
continue reading

1
EP223 AI Addressable, Not AI Solvable: Reflections from RSA 2025
31:37
31:37
Play later
Play later
Lists
Like
Liked
31:37Guests: no guests, just us in the studio Topics: At RSA 2025, did we see solid, measurably better outcomes from AI use in security, or mostly just "sizzle" and good ideas with potential? Are the promises of an "AI SOC" repeating the mistakes seen with SOAR in previous years regarding fully automated security operations? Does "AI SOC" work according…
…
continue reading

1
EP222 From Post-IR Lessons to Proactive Security: Deconstructing Mandiant M-Trends
35:19
35:19
Play later
Play later
Lists
Like
Liked
35:19Guests: Kirstie Failey @ Google Threat Intelligence Group Scott Runnels @ Mandiant Incident Response Topics: What is the hardest thing about turning distinct incident reports into a fun to read and useful report like M-Trends? How much are the lessons and recommendations skewed by the fact that they are all “post-IR” stories? Are “IR-derived” secur…
…
continue reading

1
EP221 Special - Semi-Live from Google Cloud Next 2025: AI, Agents, Security ... Cloud?
30:26
30:26
Play later
Play later
Lists
Like
Liked
30:26Guests: No guests [Tim in Vegas and Anton remote] Topics: So, another Next is done. Beyond the usual Vegas chaos, what was the overarching security theme or vibe you [Tim] felt dominated the conference this year? Thinking back to Next '24, what felt genuinely different this year versus just the next iteration of last year's trends? Last year, we po…
…
continue reading

1
EP220 Big Rewards for Cloud Security: Exploring the Google VRP
29:13
29:13
Play later
Play later
Lists
Like
Liked
29:13Guests: Michael Cote, Cloud VRP Lead, Google Cloud Aadarsh Karumathil, Security Engineer, Google Cloud Topics: Vulnerability response at cloud-scale sounds very hard! How do you triage vulnerability reports and make sure we’re addressing the right ones in the underlying cloud infrastructure? How do you determine how much to pay for each vulnerabili…
…
continue reading

1
EP219 Beyond the Buzzwords: Decoding Cyber Risk and Threat Actors in Asia Pacific
31:46
31:46
Play later
Play later
Lists
Like
Liked
31:46Guest: Steve Ledzian, APAC CTO, Mandiant at Google Cloud Topics: We've seen a shift in how boards engage with cybersecurity. From your perspective, what's the most significant misconception boards still hold about cyber risk, particularly in the Asia Pacific region, and how has that impacted their decision-making? Cybersecurity is rife with jargon.…
…
continue reading

1
Quadruple Supply Chain Attack, IngressNightmare Exploited, and Rumors Abound
28:47
28:47
Play later
Play later
Lists
Like
Liked
28:47🎙️ All you need to know on the latest discoveries and updates ft. Rami McCarthy 🚨In this episode of Crying Out Cloud, @Amitai Cohen & @Eden Koby Naftali are joined by Rami — a Principal Security Researcher here at Wiz.Rami adds some energy and expertise to the table as we dive into a variety of topics:• GitHub Action supply chain attack • IngressNi…
…
continue reading

1
EP218 IAM in the Cloud & AI Era: Navigating Evolution, Challenges, and the Rise of ITDR/ISPM
30:10
30:10
Play later
Play later
Lists
Like
Liked
30:10Guest: Henrique Teixeira, Senior VP of Strategy, Saviynt, ex-Gartner analyst Topics: How have you seen IAM evolve over the years, especially with the shift to the cloud, and now AI? What are some of the biggest challenges and opportunities these two shifts present? ITDR (Identity Threat Detection and Response) and ISPM (Identity Security Posture Ma…
…
continue reading

1
EP217 Red Teaming AI: Uncovering Surprises, Facing New Threats, and the Same Old Mistakes?
23:11
23:11
Play later
Play later
Lists
Like
Liked
23:11Guest: Alex Polyakov, CEO at Adversa AI Topics: Adversa AI is known for its focus on AI red teaming and adversarial attacks. Can you share a particularly memorable red teaming exercise that exposed a surprising vulnerability in an AI system? What was the key takeaway for your team and the client? Beyond traditional adversarial attacks, what emergin…
…
continue reading

1
Ingress Nightmare: How a Single Request Could Take Over Your K8s Cluster
22:26
22:26
Play later
Play later
Lists
Like
Liked
22:26🎙️ All you need to know on our latest discovery #IngressNightmare 🚨In this episode of Crying Out Cloud, Amitai Cohen & Eden Koby Naftali are joined by Nir Ohfeld — Head of Vulnerability Research at Wiz. Nir and his team have uncovered some of the most impactful vulnerabilities affecting cloud and SaaS applications. In this episode, he's diving into…
…
continue reading

1
EP216 Ephemeral Clouds, Lasting Security: CIRA, CDR, and the Future of Cloud Investigations
31:43
31:43
Play later
Play later
Lists
Like
Liked
31:43Guest: James Campbell, CEO, Cado Security Chris Doman, CTO, Cado Security Topics: Cloud Detection and Response (CDR) vs Cloud Investigation and Response Automation(CIRA) ... what’s the story here? There is an “R” in CDR, right? Can’t my (modern) SIEM/SOAR do that? What about this becoming a part of modern SIEM/SOAR in the future? What gets better w…
…
continue reading

1
EP215 Threat Modeling at Google: From Basics to AI-powered Magic
26:03
26:03
Play later
Play later
Lists
Like
Liked
26:03Guest: Meador Inge, Security Engineer, Google Cloud Topics: Can you walk us through Google's typical threat modeling process? What are the key steps involved? Threat modeling can be applied to various areas. Where does Google utilize it the most? How do we apply this to huge and complex systems? How does Google keep its threat models updated? What …
…
continue reading

1
EP214 Reconciling the Impossible: Engineering Cloud Systems for Diverging Regulations
29:22
29:22
Play later
Play later
Lists
Like
Liked
29:22Guest: Archana Ramamoorthy, Senior Director of Product Management, Google Cloud Topics: You are responsible for building systems that need to comply with laws that are often mutually contradictory. It seems technically impossible to do, how do you do this? Google is not alone in being a global company with local customers and local requirements. Ho…
…
continue reading

1
From Hotmail Hacks to AI hype, CTFs & Cloud Guardian: with Ashish Rajan
21:56
21:56
Play later
Play later
Lists
Like
Liked
21:56🎙 Ready for the latest on AI, cloud security, and Fortune 500 challenges?This week on our podcast Crying Out Cloud, we're joined by none other than Ashish Rajan— a seasoned cybersecurity leader and host of the AI Cybersecurity Podcast & Cloud Security Podcast.Amitai Cohen & Eden Koby Naftali dive into:- The evolution of AI & cloud security- Lessons…
…
continue reading

1
EP213 From Promise to Practice: LLMs for Anomaly Detection and Real-World Cloud Security
28:01
28:01
Play later
Play later
Lists
Like
Liked
28:01Guest: Yigael Berger, Head of AI, Sweet Security Topic: Where do you see a gap between the “promise” of LLMs for security and how they are actually used in the field to solve customer pains? I know you use LLMs for anomaly detection. Explain how that “trick” works? What is it good for? How effective do you think it will be? Can you compare this to …
…
continue reading

1
EP212 Securing the Cloud at Scale: Modern Bank CISO on Metrics, Challenges, and SecOps
33:16
33:16
Play later
Play later
Lists
Like
Liked
33:16Guest: Dave Hannigan, CISO at Nu Bank Topics: Tell us about the challenges you're facing as CISO at NuBank and how are they different from your past life at Spotify? You're a big cloud based operation - what are the key challenges you're tracking in your cloud environments? What lessons do you wish you knew back in your previous CISO run [at Spotif…
…
continue reading

1
HACKERS ARE HIJACKING CLOUD KEYS: The Rise of Cloud-Native Ransomware
23:21
23:21
Play later
Play later
Lists
Like
Liked
23:21From Supply Chain Attacks to S3 Ransomware: Critical Cloud Security Stories You Need to Know. 🎙️ In this episode of Crying Out Cloud, Eden and Amitai break down the latest cloud security chaos, from sneaky supply chain attacks to AI-powered malware:1) How attackers exploited a GitHub misconfiguration to enable a supply chain attack.2) The latest tw…
…
continue reading

1
EP211 Decoding the Underground: Google's Dual-Lens Threat Intelligence Magic
26:02
26:02
Play later
Play later
Lists
Like
Liked
26:02Guest: Kimberly Goody, Head of Intel Analysis and Production, Google Cloud Topics: Google's Threat Intelligence Group (GTIG) has a unique position, accessing both underground forum data and incident response information. How does this dual perspective enhance your ability to identify and attribute cybercriminal campaigns? Attributing cyberattacks w…
…
continue reading

1
EP210 Cloud Security Surprises: Real Stories, Real Lessons, Real "Oh No!" Moments
26:58
26:58
Play later
Play later
Lists
Like
Liked
26:58Guest: Or Brokman, Strategic Google Cloud Engineer, Security and Compliance, Google Cloud Topics: Can you tell us about one particular cloud consulting engagement that really sticks out in your memory? Maybe a time when you lifted the hood, so to speak, and were absolutely floored by what you found – good or bad! In your experience, what's that one…
…
continue reading

1
Norwegian Cloud Security, Open Source Tools, and Financial Sector Risks with Karim El-Melhaoui
21:58
21:58
Play later
Play later
Lists
Like
Liked
21:58🎙️ SEASON PREMIERE ALERT: Tune in to our latest episode featuring Karim El-Melhaoui, where we dive into the latest cloud security challenges ☁️🔥 Amitai Cohen & Eden Koby Naftali are kicking off the season with:- Cyber risk vs. operational risk – Why cyber risk is harder to quantify and how Norges Bank used NIST's Cybersecurity Framework to strength…
…
continue reading

1
EP209 vCISO in the Cloud: Navigating the New Security Landscape (and Don’t Forget Resilience!)
29:06
29:06
Play later
Play later
Lists
Like
Liked
29:06Guests: Beth Cartier, former CISO, vCISO, founder of Initiative Security Guest host of the CISO mini-series: Marina Kaganovich, Executive Trust Lead, Office of the CISO @ Google Cloud Topics: How is that vCISO’ing going? What is special about vCISO and cloud? Is it easier or harder? AI, cyber, resilience - all are hot topics these days. In the cont…
…
continue reading

1
DeepSeek Data Leak with Gal Nagli (Wiz Research)
11:02
11:02
Play later
Play later
Lists
Like
Liked
11:02Why is everyone suddenly talking about DeepSeek? 👀🎙️ If you've been seeing DeepSeek everywhere but are wondering what the actual buzz is about - this is for you: Our new podcast features Gal Nagli from the Wiz Research team, breaking it down with Eden Koby Naftali and Amitai Cohen.Plus: Get the full story behind our recent DeepSeek database discove…
…
continue reading

1
EP208 The Modern CISO: Balancing Risk, Innovation, and Business Strategy (And Where is Cloud?)
31:19
31:19
Play later
Play later
Lists
Like
Liked
31:19Guest host: Marina Kaganovich, Executive Trust Lead, Office of the CISO @ Google Cloud Guest: John Rogers, CISO @ MSCI Topics: Can you briefly walk us through your CISO career path? What are some of the key (cloud or otherwise) trends that CISOs should be keeping an eye on? What is the time frame for them? What are the biggest cloud security challe…
…
continue reading

1
EP207 Slaying the Ransomware Dragon: Can a Startup Succeed?
32:55
32:55
Play later
Play later
Lists
Like
Liked
32:55Guest: Bob Blakley, Co-founder and Chief Product Officer of Mimic Topics: Tell us about the ransomware problem - isn't this a bit of old news? Circa 2015, right? What makes ransomware a unique security problem? What's different about ransomware versus other kinds of malware? What do you make of the “RansomOps” take (aka “ransomware is not malware”)…
…
continue reading

1
EP206 Paying the Price: Ransomware's Rising Stakes in the Cloud
33:01
33:01
Play later
Play later
Lists
Like
Liked
33:01Guest: Allan Liska, CSIRT at Recorded Future, now part of Mastercard Topics: Ransomware has become a pervasive threat. Could you provide us with a brief overview of the current ransomware landscape? It's often said that ransomware is driven by pure profit. Can you remind us of the business model of ransomware gangs, including how they operate, thei…
…
continue reading

1
EP205 Cybersecurity Forecast 2025: Beyond the Hype and into the Reality
28:19
28:19
Play later
Play later
Lists
Like
Liked
28:19Guest: Andrew Kopcienski, Principal Intelligence Analyst, Google Threat Intelligence Group Questions: You have this new Cybersecurity Forecast 2025 report, what’s up with that? We are getting a bit annoyed about the fear-mongering on “oh, but attackers will use AI.” You are a threat analyst, realistically, how afraid are you of this? The report dis…
…
continue reading

1
Co-Founding Wiz, R&D and Security Leadership with Roy Reznik
32:15
32:15
Play later
Play later
Lists
Like
Liked
32:15🎙️ Every great story starts with a beer in the Alps...From building #Adallom to becoming a sommelier — hear Roy Reznik's journey as Co-Founder and VP R&D at @wiz in our podcast season finale!In this episode Eden Koby Naftali & Amitai Cohen dive into:☁️ Roy's journey from Tel Aviv to London—culture.🛠️ How companies can scale fast while staying secur…
…
continue reading

1
EP204 Beyond PCAST: Phil Venables on the Future of Resilience and Leading Indicators
30:32
30:32
Play later
Play later
Lists
Like
Liked
30:32Guest: Phil Venables, Vice President, Chief Information Security Officer (CISO) @ Google Cloud Topics Why is our industry suddenly obsessed with resilience? Is this ransomware’s doing? How did the PCAST report come to be? Can you share the backstory and how it was created? The PCAST report emphasizes the importance of leading indicators for securit…
…
continue reading

1
EP203 Cloud Shared Responsibility: Beyond the Blame Game with Rich Mogull
37:13
37:13
Play later
Play later
Lists
Like
Liked
37:13Guest: Rich Mogull, SVP of Cloud Security at Firemon and CEO at Securosis Topics: Let’s talk about cloud security shared responsibility. How to separate the blame? Is there a good framework for apportioning blame? You've introduced the Cloud Shared Irresponsibilities Model, stating cloud providers will be considered partially responsible for breach…
…
continue reading

1
post:Invent with Scott Piper (re:Invent digest)
32:47
32:47
Play later
Play later
Lists
Like
Liked
32:47🎙️ Unpack AWS re:Invent's top announcements, trends, and what's next for cloud practitioners with @Scott Piper!Join Eden Naftali and Amitai Cohen in our latest #CryingOutCloud episode featuring Scott Piper, Wiz's Principal Cloud Security Researcher and "cloud security historian".In this episode:🌟 AWS re:Invent highlights: Aurora DSQL, Nova genAI, E…
…
continue reading

1
EP202 Beyond Tiered SOCs: Detection as Code and the Rise of Response Engineering
37:09
37:09
Play later
Play later
Lists
Like
Liked
37:09Guest: Amine Besson, Tech Lead on Detection Engineering, Behemoth Cyberdefence Topics: What is your best advice on detection engineering to organizations who don’t want to engineer anything in security? What is the state of art when it comes to SOC ? Who is doing well? What on Earth is a fusion center? Why classic “tiered SOCs” fall flat when deali…
…
continue reading

1
EP201 Every CTO Should Be a CSTO (Or Else!) - Transformation Lessons from The Hoff
36:57
36:57
Play later
Play later
Lists
Like
Liked
36:57Guest: Chris Hoff, Chief Secure Technology Officer at Last Pass Topics: I learned that you have a really cool title that feels very “now” - Chief Secure Technology Officer? What’s the story here? Weirdly, I now feel that every CTO better be a CSTO or quit their job :-) After, ahem, not-so-recent events you had a chance to rebuild a lot of your stac…
…
continue reading

1
Red Team Tactics with EA’s Johann Rehberger
34:38
34:38
Play later
Play later
Lists
Like
Liked
34:38Dive into the latest #CryingOutCloud episode featuring Johann Rehberger! Join Eden and Amitai as they sit down with Johann Rehberger, Red Team Director at @electronicarts and a cybersecurity expert. Johann also publishes innovative security research on his blog, Embrace the Red. What you'll learn: 📌 Red teaming strategies to strengthen security pro…
…
continue reading

1
EP200 Zero Touch Prod, Security Rings, and Foundational Services: How Google Does Workload Security
27:38
27:38
Play later
Play later
Lists
Like
Liked
27:38Guest: Michael Czapinski, Security & Reliability Enthusiast, Google Topics: “How Google protects its production services” paper covers how Google's infrastructure balances several crucial aspects, including security, reliability, development speed, and maintainability. How do you prioritize these competing demands in a real-world setting? What atta…
…
continue reading

1
EP199 Your Cloud IAM Top Pet Peeves (and How to Fix Them)
29:26
29:26
Play later
Play later
Lists
Like
Liked
29:26Guests: Michele Chubirka, Staff Cloud Security Advocate, Google Cloud Sita Lakshmi Sangameswaran, Senior Developer Relations Engineer, Google Cloud Topics: What is your reaction to “in the cloud you are one IAM mistake away from a breach”? Do you like it or do you hate it? Or do you "it depends" it? :-) Everyone's talking about how "identity is the…
…
continue reading

1
EP198 GenAI Security: Unseen Attack Surfaces & AI Pentesting Lessons
27:22
27:22
Play later
Play later
Lists
Like
Liked
27:22Guests: Ante Gojsalic, Co-Founder & CTO at SplxAI Topics: What are some of the unique challenges in securing GenAI applications compared to traditional apps? What current attack surfaces are most concerning for GenAI apps, and how do you see these evolving in the future? Do you have your very own list of top 5 GenAI threats? Everybody seem to! What…
…
continue reading

1
Canadian Cybersecurity, Open Source Risks, and AppSec Insights with Tanya Janca
35:18
35:18
Play later
Play later
Lists
Like
Liked
35:18🎙️ Tune in to the latest #CryingOutCloud episode featuring Tanya Janca, where we dive into all things cloud!Join Eden and Amitai as they welcome Tanya Janca, founder of 'We Hack Purple', and the author of 'Alice and Bob Learn Application Security'. She's seen it all—from launching AppSec programs to teaching secure coding and leading on education a…
…
continue reading

1
EP197 SIEM (Decoupled or Not), and Security Data Lakes: A Google SecOps Perspective
29:34
29:34
Play later
Play later
Lists
Like
Liked
29:34Guest: Travis Lanham, Uber Tech Lead (UTL) for Security Operations Engineering, Google Cloud Topics: There’s been a ton of discussion in the wake of the three SIEM week about the future of SIEM-like products. We saw a lot of takes on how this augurs the future of disassembled or decoupled SIEMs. Can you explain what these disassembled SIEMs are all…
…
continue reading

1
Hybrid Cloud Attacks, Linux Malware, and LLMJacking Exposed
18:52
18:52
Play later
Play later
Lists
Like
Liked
18:52🎙️ Ready for the latest on Hybrid Cloud Attacks, Linux Malware, and LLMJacking? Join our hosts Eden Koby Naftali and Amitai Cohen in our NEW #CryingOutCloud episode.In this episode:📌 The perfctl malware campaign—stealthily mining crypto on thousands of Linux machines undetected for years 📌 Storm-0501 hybrid cloud attacks, targeting everything from …
…
continue reading

1
EP196 AI+TI: What Happens When Two Intelligences Meet?
28:08
28:08
Play later
Play later
Lists
Like
Liked
28:08Guest: Vijay Ganti, Director of Product Management, Google Cloud Security Topics: What have been the biggest pain points for organizations trying to use threat intelligence (TI)? Why has it been so difficult to convert threat knowledge into effective security measures in the past? In the realm of AI, there's often hype (and people who assume “it’s …
…
continue reading

1
EP195 Containers vs. VMs: The Security Showdown!
41:16
41:16
Play later
Play later
Lists
Like
Liked
41:16Cross-over hosts: Kaslin Fields, co-host at Kubernetes Podcast Abdel Sghiouar, co-host at Kubernetes Podcast Guest: Michele Chubirka, Cloud Security Advocate, Google Cloud Topics: How would you approach answering the question ”what is more secure, container or a virtual machine (VM)?” Could you elaborate on the real-world implications of this for s…
…
continue reading

1
EP194 Deep Dive into ADR - Application Detection and Response
30:55
30:55
Play later
Play later
Lists
Like
Liked
30:55Guest: Daniel Shechter, Co-Founder and CEO at Miggo Security Topics: Why do we need Application Detection and Response (ADR)? BTW, how do you define it? Isn’t ADR a subset of CDR (for cloud)? What is the key difference that sets ADR apart from traditional EDR and CDR tools? Why can’t I just send my application data - or eBPF traces - to my SIEM and…
…
continue reading

1
AI Toolkit Risks, CUPS Vulnerabilities, and Google's Infostealer Defenses
24:04
24:04
Play later
Play later
Lists
Like
Liked
24:04🎙️ Catch the latest episode of #CryingOutCloud, where Amitai Cohen and Eden Koby Naftali tackle key cloud security challenges from AI Toolkit Risks to CUPS Vulnerabilities!Tune in to hear about:📌 Wiz Research discovered a vulnerability affecting the Nvidia container toolkit📌 Google's novel Info Stealers Mitigations📌 All the talk around the CUPS vul…
…
continue reading