Artwork

Content provided by Lukasz Lazewski. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Lukasz Lazewski or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Cloud cybersecurity: Vulnerabilities, frauds and limitations | Mateusz Chrobok | The Dev is in the Details #5

1:00:16
 
Share
 

Manage episode 410489394 series 3516159
Content provided by Lukasz Lazewski. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Lukasz Lazewski or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

► Is cloud security an illusion?

Join us in this eye-opening episode as cybersecurity expert Mateusz Chrobok reveals the vulnerabilities and limitations lurking within cloud services. From analyzing real-life examples to dissecting the fraudulent tactics used by cybercriminals, this discussion will shed light on the harsh realities of cloud security.

► Our guest 🌟

Mateusz Chrobok 👉 https://www.linkedin.com/in/mateuszchrobok/
Cybersecurity, AI and Startup consultant.

► In today’s episode:

  • Proactive measures undertaken by cloud service providers to safeguard the integrity of the cloud and the tangible outcomes of their efforts.
  • Sophisticated tactics employed by cybercriminals in exploiting vulnerabilities within cloud services.
  • Nuanced methodologies to infiltrate cloud systems and jeopardize sensitive data.
  • In-depth analysis and real-world case studies illustrating how vulnerabilities in cloud environments can lead to security breaches and data compromises.
  • Realms of malvertising, fraudulent activities, and the clandestine operations of the darknet.
  • Navigating the delicate balance between individual freedoms and the imperative of security.

► Decoding the timeline:

00:00 – Cloud service providers' responsibilities and vulnerabilities
06:18 – Limitations of the cloud
09:35 – Opens source vs closed source safety considerations
12:37 – Poisoned language models
16:03 – Malvertising
20:45 – Darknet operations
23:23 - Freedom vs security on the Internet
36:49 - Cryptography, AI, and cybersecurity
52:11 - Battling misinformation in the digital age

#AI #cybersecurity #cloud

► Materials and information mentioned in the episode:

***
The Dev is in the Details is a podcast where we talk about technology, business and their impacts on the world around us.

Łukasz Łażewski 👉 https://www.linkedin.com/in/lukasz-lazewski-40562718/
Pedro Paranhos 👉 https://www.linkedin.com/in/pedroparanhos/
Write to us 👉 podcast@llinformatics.com

  continue reading

Chapters

1. Cloud service providers' responsibilities and vulnerabilities (00:00:00)

2. Limitations of the cloud (00:06:18)

3. Opens source vs closed source safety considerations (00:09:35)

4. Poisoned language models (00:12:37)

5. Malvertising (00:16:03)

6. Darknet operations (00:20:45)

7. Freedom vs security on the Internet (00:23:23)

8. Cryptography, AI, and Cybersecurity Trends (00:36:49)

9. Battling Misinformation in the Digital Age (00:52:11)

7 episodes

Artwork
iconShare
 
Manage episode 410489394 series 3516159
Content provided by Lukasz Lazewski. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Lukasz Lazewski or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

► Is cloud security an illusion?

Join us in this eye-opening episode as cybersecurity expert Mateusz Chrobok reveals the vulnerabilities and limitations lurking within cloud services. From analyzing real-life examples to dissecting the fraudulent tactics used by cybercriminals, this discussion will shed light on the harsh realities of cloud security.

► Our guest 🌟

Mateusz Chrobok 👉 https://www.linkedin.com/in/mateuszchrobok/
Cybersecurity, AI and Startup consultant.

► In today’s episode:

  • Proactive measures undertaken by cloud service providers to safeguard the integrity of the cloud and the tangible outcomes of their efforts.
  • Sophisticated tactics employed by cybercriminals in exploiting vulnerabilities within cloud services.
  • Nuanced methodologies to infiltrate cloud systems and jeopardize sensitive data.
  • In-depth analysis and real-world case studies illustrating how vulnerabilities in cloud environments can lead to security breaches and data compromises.
  • Realms of malvertising, fraudulent activities, and the clandestine operations of the darknet.
  • Navigating the delicate balance between individual freedoms and the imperative of security.

► Decoding the timeline:

00:00 – Cloud service providers' responsibilities and vulnerabilities
06:18 – Limitations of the cloud
09:35 – Opens source vs closed source safety considerations
12:37 – Poisoned language models
16:03 – Malvertising
20:45 – Darknet operations
23:23 - Freedom vs security on the Internet
36:49 - Cryptography, AI, and cybersecurity
52:11 - Battling misinformation in the digital age

#AI #cybersecurity #cloud

► Materials and information mentioned in the episode:

***
The Dev is in the Details is a podcast where we talk about technology, business and their impacts on the world around us.

Łukasz Łażewski 👉 https://www.linkedin.com/in/lukasz-lazewski-40562718/
Pedro Paranhos 👉 https://www.linkedin.com/in/pedroparanhos/
Write to us 👉 podcast@llinformatics.com

  continue reading

Chapters

1. Cloud service providers' responsibilities and vulnerabilities (00:00:00)

2. Limitations of the cloud (00:06:18)

3. Opens source vs closed source safety considerations (00:09:35)

4. Poisoned language models (00:12:37)

5. Malvertising (00:16:03)

6. Darknet operations (00:20:45)

7. Freedom vs security on the Internet (00:23:23)

8. Cryptography, AI, and Cybersecurity Trends (00:36:49)

9. Battling Misinformation in the Digital Age (00:52:11)

7 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide