Go offline with the Player FM app!
Using AI Agents to Solve Cloud Vulnerability Overload
Manage episode 487974559 series 2853525
In this episode, Ashish Rajan talks with Harry Wetherald, Co-Founder & CEO of Maze, about the reality of modern vulnerability management. They explore why current tools like CNAPPs can generate up to 90% false positives and how AI agents can provide a real solution by thinking like a security engineer to identify genuine, exploitable threats. Learn about the challenges of building your own AI solutions and how this new approach can eliminate noise and build trust between security and engineering team
Guest Socials - Harry's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction(02:27) Who is Harry Wetherald?(04:45) The "Wall of Red": Why Security Tools Create 90% False Positives(06:21) The Mission: Solving Vulnerability Overload with AI(10:11) How an AI Agent Investigates a Vulnerability(16:09) The Hard Reality of Building Your Own AI Solution(18:14) Building for a Future of Evolving AI Models(20:00) What is the Role of an MCP (AI Copilot)?(27:31) Building AI Agents for Cloud Security(31:25) "Think Like a Hacker": Asking AI to Red Team Your Cloud(33:04) How AI Will Shape Security Programs in 2025 & Beyond(36:20) Fun Questions with Harry
Thank you Maze for sponsoring this episode.
313 episodes
Manage episode 487974559 series 2853525
In this episode, Ashish Rajan talks with Harry Wetherald, Co-Founder & CEO of Maze, about the reality of modern vulnerability management. They explore why current tools like CNAPPs can generate up to 90% false positives and how AI agents can provide a real solution by thinking like a security engineer to identify genuine, exploitable threats. Learn about the challenges of building your own AI solutions and how this new approach can eliminate noise and build trust between security and engineering team
Guest Socials - Harry's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction(02:27) Who is Harry Wetherald?(04:45) The "Wall of Red": Why Security Tools Create 90% False Positives(06:21) The Mission: Solving Vulnerability Overload with AI(10:11) How an AI Agent Investigates a Vulnerability(16:09) The Hard Reality of Building Your Own AI Solution(18:14) Building for a Future of Evolving AI Models(20:00) What is the Role of an MCP (AI Copilot)?(27:31) Building AI Agents for Cloud Security(31:25) "Think Like a Hacker": Asking AI to Red Team Your Cloud(33:04) How AI Will Shape Security Programs in 2025 & Beyond(36:20) Fun Questions with Harry
Thank you Maze for sponsoring this episode.
313 episodes
All episodes
×
1 "Escape-Proof" Cloud: How Block built an Automated Approach to Egress Control 40:27

1 Prioritizing Cloud Security: How to Decide What to Protect First 41:08

1 Migrating from “Tick Box" Compliance to Automating GRC in a Multi-Cloud World 28:48

1 Using AI Agents to Solve Cloud Vulnerability Overload 38:09

1 Adapting to New Threats, Copilot Risks & The Future of Data (Feat. Matthew Radolec, Varonis) 39:31


1 CYBERSECURITY for AI: The New Threat Landscape & How Do We Secure It? 40:43

1 Cloud Security Evolved: From CNAPP to AI Threats 19:16

1 RSA Conference 2025 Recap: Top Themes, Actionable Insights & Future Trends 53:52

1 Mindset: Modern SOC Strategies for Cloud & Kubernetes (Ft Sergej Epp. Ex-Deutsche Bank) 35:01

1 Scaling Container Security Without Slowing Developers 28:13

1 How Attackers Stay Hidden Inside Your Azure Cloud 35:27

1 How Confluent Migrated Kubernetes Networking Across AWS, Azure & GCP 15:32

1 The New Future of Cloud Security: Vendor Lock-In, Runtime, and SOC Readiness 51:35

Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.