show episodes
 
Are you on top of the latest innovations in data, analytics, and AI? With data being pivotal to strategy and change, the Data-powered Innovation Jam podcast gives you the key to some of the most crucial aspects of business success. Through our guests, we bring you the latest trends from the world of data and AI, discussing the best ideas and experiences. Our hosts with their decades of profound experience and a background in avant-garde music, will also explore the edges of jazz, rock, and p ...
  continue reading
 
Artwork

1
Cloud Security Podcast

Cloud Security Podcast Team

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
  continue reading
 
Loading …
show series
 
Transitioning a mature organization from an API-first model to an AI-first model is no small feat. In this episode, Yash Kosaraju, CISO of Sendbird, shares the story of how they pivoted from a traditional chat API platform to an AI agent platform and how security had to evolve to keep up. Yash spoke about the industry's obsession with "Zero Trust,"…
  continue reading
 
Thinking of building your own AI security tool? In this episode, Santiago Castiñeira, CTO of Maze, breaks down the realities of the "Build vs. Buy" debate for AI-first vulnerability management. While building a prototype script is easy, scaling it into a maintainable, audit-proof system is a massive undertaking requiring specialized skills often mi…
  continue reading
 
What does the future of AI sound like? In this special year-end episode of Data-powered Innovation Jam, we riff on seven bold predictions for 2026, from security-first AI and multi-agent ecosystems to industry-native intelligence and even synthetic curiosity. Join hosts Ron Tolido and Robert Engels as they jam with thought leaders on trends that wi…
  continue reading
 
In this episode, Cliff Crosland, CEO & co-founder of Scanner.dev, shares his candid journey of trying (and initially failing) to build an in-house security data lake to replace an expensive traditional SIEM. Cliff explains the economic breaking point where scaling a SIEM became "more expensive than the entire budget for the engineering team". He de…
  continue reading
 
Bringing you a very special edition of the Data Powered Innovation Jam podcast, recorded live during a tech road trip through San Francisco and Silicon Valley. This episode blends the city’s musical heritage with cutting-edge innovation, exploring how creativity and technology intersect. Hosts Robert Engels, together with our ‘tech guy’ Alex Bulat …
  continue reading
 
How do you establish trust in an AI SOC, especially in a regulated environment? Grant Oviatt, Head of SOC at Prophet Security and a former SOC leader at Mandiant and Red Canary, tackles this head-on as a self-proclaimed "AI skeptic". Grant shared that after 15 years of being "scared to death" by high-false-positive AI, modern LLMs have changed the …
  continue reading
 
Are we underestimating how the agentic world is impacting cybersecurity? We spoke to Mohan Kumar, who did production security at Box for a deep dive into the threats of true autonomous AI agents. The conversation moves beyond simple LLM applications (like chatbots) to the new world of dynamic, goal-driven agents that can take autonomous actions. Mo…
  continue reading
 
The silos between Application Security and Cloud Security are officially breaking down, and AI is the primary catalyst. In this episode, Tejas Dakve, Senior Manager, Application Security, Bloomberg Industry Group and Aditya Patel, VP of Cybersecurity Architecture discuss how the AI-driven landscape is forcing a fundamental change in how we secure o…
  continue reading
 
Is the AI SOC analyst just hype, or is there measurable ROI? We spoke to Edward Wu, founder of Dropzone AI about this and he shared insights from a recent Cloud Security Alliance (CSA) benchmark report that quantified the impact of AI augmentation on SOC teams. The study revealed significant improvements in speed (45-60% faster investigations) and …
  continue reading
 
In this genre-blending episode of Data Powered Innovation Jam, hosts Ron Tolido, Robert Engels, and Arne Rossman welcome Stephen Brobst, CTO of Ab Initio and former CTO of Terradata, for a deep dive into the art of mixing data, AI, and music. From punk rock roots and stage-diving legends to the reinvention of enterprise data platforms, Stephen shar…
  continue reading
 
Can you just use Claude Code or another LLM to "vibe code" your way into building an AI SOC? In this episode, Ariful Huq, Co-Founder and Head of Product at Exaforce spoke about the reality being far more complex than the hype suggests. He explains why a simple "bolt-on" approach to AI in the SOC is insufficient if you're looking for real security o…
  continue reading
 
How do you perform incident response on a Kubernetes cluster when you're not even on the same network? In this episode, Damien Burks, Senior Security engineer breaks down the immense challenges of container security and why most commercial tools are failing at automated response. While many CNAPPs provide runtime detection, they lack a "sophisticat…
  continue reading
 
Welcome to the latest episode of the Data Powered Innovation Jam, where data meets disco and AI grooves with funk. After a long summer break, our hosts return with fresh stories, musical nostalgia, and cutting-edge insights into the world of supply chain superintelligence. In this vibrant and eclectic episode, we’re joined by Guillaume Waline, Seni…
  continue reading
 
"The next five years are gonna be wild." That's the verdict from Forrester Principal Analyst Allie Mellen on the state of Security Operations. This episode dives into the "massive reset" that is transforming the SOC, driven by the rise of generative AI and a revolution in data management. Allie explains why the traditional L1, L2, L3 SOC model, lon…
  continue reading
 
The race to deploy AI is on, but are the cloud platforms we rely on secure by default? This episode features a practical, in-the-weeds discussion with Kyler Middleton, Principal Developer, Internal AI Solutions, Veradigm and Sai Gunaranjan, Lead Architect, Veradigm as they compare the security realities of building AI applications on the two larges…
  continue reading
 
For the last 30 years, email security has been stuck in the past, focusing almost entirely on stopping bad things from getting into the inbox. In this episode, Rajan Kapoor, Field CISO at Material Security and former Director of Security at Dropbox, argues that this pre-breach mindset is dangerously outdated. The real challenge today is post-breach…
  continue reading
 
You have the visibility, you see the alerts, but your security backlog is still growing faster than your team can fix it. So, are you actually getting more secure? In this episode, Snir Ben Shimol, CEO of Zest Security, argues that "knowing about an open door or an open window don't make you more secure... just make you more aware" . We spoke about…
  continue reading
 
The conversation around cloud security is maturing beyond simple threat detection. As the industry grapples with alert fatigue, we explore the necessary shift from a reactive to a proactive security posture, questioning if a traditional SecOps model is sufficient for modern cloud environments. We spoke with Gil Geron, CEO of Orca Security, to exami…
  continue reading
 
Identity is the root cause of over 70% of all security incidents, yet many organizations still rely on fundamentally flawed authentication methods. In this episode, Jasson Casey, CEO and co-founder of Beyond Identity, explains why even common forms of MFA are insufficient and why any system that relies on a "secret moving" is vulnerable to attack. …
  continue reading
 
The nature of Security Operations is changing. As cloud environments grow in complexity and data volumes explode, traditional approaches to detection and response are proving insufficient. This episode features an in-depth conversation with Kyle Polley, who leads the AI security team at Perplexity, about a modern blueprint for the Security Operatio…
  continue reading
 
What does the integration of AI into a Security Operations Center (SOC) practically look like? This episode explores the concept of the "Agentic SOC," moving beyond marketing terms to discuss its real-world applications and limitations. Ashish Rajan is joined by Edward Wu, CEO of Dropzone AI, for an in-depth discussion on the current state of artif…
  continue reading
 
A $10 billion fraud vector is currently exploiting a common feature in many cloud-native applications: the SMS verification flow. This isn't a traditional breach. Instead of stealing data, adversaries use bots to trigger costs that are quietly absorbed into your company's operational budget, often showing up as an inflated cell phone or marketing b…
  continue reading
 
How do you modernize security in a 180-year-old company that operates critical national infrastructure? What does it look like when you discover tens or even hundreds of thousands of credentials hidden across your estate? In this episode, we sit down with Christian Schwarz, Security Director for Network Services at BT Group , recorded at HashiDays …
  continue reading
 
Is AI making application security easier or harder? We spoke to Amit Chita, Field CTO at Mend.io, the rise of AI agents in the Software Development Lifecycle (SDLC) presents a unique opportunity for security teams to be stricter than ever before. As developers increasingly use AI agents and integrate LLMs into applications, the attack surface is ev…
  continue reading
 
Is your organization struggling with secret management across bare metal, hybrid, and multi-cloud environments? Standard cloud-native tools often fall short when you need a single, standardized solution that bridges all your infrastructure. Dan Popescu, Senior Site Reliability Engineer at Booking.com joins us to share how they built a cloud-agnosti…
  continue reading
 
Ready for your Hour of (Data) Power with some Radioactive and Electric Feel thrown in? Ok, so hang tight, get your coffee or lemonade (depending on how your summer looks like!), as we bring you a double whammy from your newest Data-powered Innovation Jam to celebrate the anniversary launch of the 10th edition of the Data Powered Innovation Review. …
  continue reading
 
Many organizations focus on keeping attackers out, but what happens when one gets in? We spoke to Ramesh Ramani, Staff Security Engineer at Block about the real challenge, which is preventing them from leaving with your data. In this episode, Ramesh details the innovative system his team built to automate egress access control at scale, moving beyo…
  continue reading
 
When you can't protect everything at once, how do you decide what matters most? This episode tackles the core challenge of security prioritization. Geet Pradhan, Senior Security Engineer at Lime joins the podcast to share his framework for building a SecOps plan when you're a small team. Learn why his team made AWS logs their number one priority , …
  continue reading
 
In many organizations, security exception management is a manual process, often treated as a simple compliance checkbox. While necessary, this approach can lead to unmonitored configurations that drift from their approved state, creating inconsistencies in an organization's security posture over time. How can teams evolve this process to support mo…
  continue reading
 
In this episode, Ashish Rajan talks with Harry Wetherald, Co-Founder & CEO of Maze, about the reality of modern vulnerability management. They explore why current tools like CNAPPs can generate up to 90% false positives and how AI agents can provide a real solution by thinking like a security engineer to identify genuine, exploitable threats. Learn…
  continue reading
 
From punk rock to process automation, from Blondie to BSON — it’s a genre-defying episode of the Data-Powered Innovation Jam where we grab a virtual bench in Central Park with Andrew Davidson, SVP of Products at MongoDB, and let the data conversation run wild. What follows is an improvisational jam session on the evolution of data, the art of distr…
  continue reading
 
AI is reshaping cybersecurity as we know it. From sophisticated AI-driven phishing attacks to the amplified risk of insider threats using tools like Copilot, the landscape is shifting at an unprecedented pace. How can security leaders and practitioners adapt? Join Ashish Rajan and Matthew Radolec (Varonis) as they explore the critical challenges an…
  continue reading
 
Is Artificial Intelligence the ultimate security dragon, we need to slay, or a powerful ally we must train? Recorded LIVE at BSidesSF, this special episode dives headfirst into the most pressing debates around AI security. Join host Ashish Rajan as he navigates the complex landscape of AI threats and opportunities with two leading experts: Jackie B…
  continue reading
 
Ready for the remix? You might have already listened to one of the most recent episodes of the Cloud Realities podcast, where six dynamic voices from two podcast teams came together to unpack Capgemini’s TechnoVision 2025. From infrastructure and applications to collaboration, user experience, automation, and — naturally — a heavy dose of data and …
  continue reading
 
As Artificial Intelligence reshapes our world, understanding the new threat landscape and how to secure AI-driven systems is more crucial than ever. We spoke to Ankur Shah, Co-Founder and CEO of Straiker about navigating this rapidly evolving frontier. In this episode, we unpack the complexities of securing AI, from the fundamental shifts in applic…
  continue reading
 
The world of cloud security is evolving at breakneck speed. Are traditional tools and strategies enough to combat the sophisticated threats of tomorrow? In this episode, we're joined by Elad Koren, Vice President of Product Management from Palo Alto Networks, to explore the dynamic journey of cloud security. Elad shares his insights on how the land…
  continue reading
 
Dive deep into the key takeaways from RSA Conference 2025 with our expert panel! Join Ashish Rajan, James Berthoty, Chris Hughes, Tanya Janca, and Francis Odum as they dissect the biggest trends, surprises, and "hot takes" from one of the world's largest cybersecurity events. In this episode, we cover: Initial reactions and the sheer scale of RSA C…
  continue reading
 
What happens when Professor Erik Proper of the Technical University of Vienna teams up with the ever-inquisitive ‘Dr. Bob’ Robert Engels – modestly supported by co-hosts Weiwei Feng and Ron Tolido - to discuss AI, models, semantics, ontologies, and context? A true PhD Fest? Or a practical exploration of the synergies between the academic and busine…
  continue reading
 
Much like a hammer sees every problem as a nail, data experts tend to see opportunity in every single data field. Collaboration on data is still one of the best ways to bring data to life and build business value on top of it. Sharing data across organizations is one of the most powerful ways to spark innovation. But when data needs to stay private…
  continue reading
 
Join Ashish Rajan in this episodeas he dives deep into the evolving world of cloud security with Sergej Epp, formerly of Deutsche Bank and Palo Alto Networks, now with Sysdig. Discover why traditional security approaches fall short in today's dynamic cloud-native environments, where workloads resemble swarms of drones rather than predictable trains…
  continue reading
 
Are you struggling to implement robust container security at scale without creating friction with your development teams? In this episode, host Ashish Rajan sits down with Cailyn Edwards, Co-Chair of Kubernetes SIG Security and Senior Security Engineer, for a masterclass in practical container security. This episode was recorded LIVE at KubeCon EU,…
  continue reading
 
In this episode, Ashish sits down with Christian Philipov, Principal Security Consultant at WithSecure, to explore the stealth tactics threat actors are using in Azure and why many of these go undetected. Christian breaks down the lesser-known APIs like Ibiza and PIM, how Microsoft Graph differs from legacy APIs, and what this means for defenders. …
  continue reading
 
Ever thought AI practitioners could win a Noble prize? Well, they already have. Not for predicting your next favourite movie or generating poetry, but for groundbreaking advancements in Life Sciences. And it won’t be the last time. In this episode, hosts Ron Tolido, Robert Engels, and Weiwei Feng find themselves venturing into unexpected territory …
  continue reading
 
Ever tried solving DNS security across a multi-cloud, multi-cluster Kubernetes setup? In this episode recorded live at KubeCon, Ashish chats with Nimisha Mehta and Alvaro Aleman from Confluent's Kubernetes Platform Team. Together, they break down the complex journey of migrating to Cilium from default CNI plugins across Azure AKS, AWS EKS, and Goog…
  continue reading
 
The cloud security landscape may have just shifted — and we're here to break it down. In this special panel episode, host Ashish Rajan is joined by an all-star group of cloud and cybersecurity experts to discuss one of the most important conversations in cloud security today: the changing nature of security architecture, SOC readiness, and how team…
  continue reading
 
In for a new venture? This episode of the Data-powered Innovation Jam has you covered. Our hosts Weiwei, Robert, and Ron welcome Brett Clark, Director, Global Business Development at blackshark.ai—a company with the modest mission of creating a digital twin of the entire planet using satellite data. It all started with Microsoft Flight Simulator, b…
  continue reading
 
Detection rules aren’t just for fun—they’re critical for securing cloud environments. But are you using them the right way? In this episode, Ashish Rajan sits down with David French, Staff Adoption Engineer for Security at Google Cloud, to break down how organizations can scale Detection as Code across AWS, Azure, and Google Cloud. Why prevention i…
  continue reading
 
In this episode we speak to Nick Jones, an expert in offensive cloud security and Head of Research at WithSecure to expose the biggest security gaps in cloud environments and why CNAPPs and CSPMs alone are not enough often. How cloud pentesting differs from traditional pentesting Why CSPMs & CNAPPs don’t tell the full cloud security story The bigge…
  continue reading
 
It’s the ultimate new hit album for generative AI: intelligent automation, autonomous systems, and—of course—agents. But while ServiceNow has been a pioneering force in this space for a long time, it still seems to fly under the radar for many data and AI experts. Time to change that. Time to bridge the worlds of Planet Process and Planet Data! For…
  continue reading
 
What does it take to secure AI-based applications in the cloud? In this episode, host Ashish Rajan sits down with Bar-el Tayouri, Head of Mend AI at Mend.io, to dive deep into the evolving world of AI security. From uncovering the hidden dangers of shadow AI to understanding the layers of an AI Bill of Materials (AIBOM), Bar-el breaks down the comp…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play