Channel Avatar

Cloud Security Podcast @UC8jQKdbAHbv7LuIQOxN_mqQ@youtube.com

19K subscribers - no pronouns :c

Cloud Security Podcast is a community first WEEKLY VIDEO POD


08:56
We accidentally Leaked AWS access Keys on Github
37:17
Become a Cloud Native CISO in 2023
07:11
Terraform Cloud Security Best Practices to manage Secrets ๐Ÿคซ
11:53
CIS Benchmark on AWS Explained with Examples
20:14
Terraform Cloud Tutorial | Terraform Cloud Setup
40:13
Software Supply Chain Controls for Terraform
17:22
Data Security RoadMap in 2023
24:57
The Cloud to Code Dilemma - Let's Talk
14:37
Preventative Cloud Security Explained!
20:02
CISO Perspective: Josh Lemos, CISO of GitLab
13:08
Privileged Access Management in Large Cloud Environments
12:48
3 Reasons How Cybersecurity Drives Transformation
12:03
3 Reasons Cybersecurity Drives Innovation
09:46
Learning Terraform as a Cloud Software Engineer
29:15
Azure Cloud Security Pentesting Skills
19:10
How to detect software supply chain attacks with Honeytokens?
37:12
Google Cloud Security Pentesting Methodology
16:50
5 Pillars of Cloud - WITH @TinyTechnicalTutorials
54:04
Network Pentest 2.0 : The Cloud Pentest Revolution
13:19
Centralised Credential Management in the Cloud
13:01
High Performance Computing in AWS Explained !
44:57
Prowler AWS Tutorial with Toni De La Fuente
07:25
Cloud Village DEFCON 2023 - What to Expect at DefCon31!
05:04
Def Con 31 Conference Guide for First-Timers From OG @jhaddixP
32:44
Google Cloud Hacking Red Team Perspective!
40:42
Cloud Security in the BoardRoom - CISO Perspective with Phil Venables
33:08
Google Cloud IAP - A Pentester Viewpoint
34:40
Doing Google Cloud Security RIGHT!
45:54
An AWS Centric View of Google Cloud Identity!
17:19
"Hot Takesโ€ with CISOs & CyberSecurity Leaders - Sandor Incze
15:00
"Hot Takes" with CISOs & CyberSecurity Leaders - Helen McLaughlin
21:06
"Hot Takes" with CISOs & CyberSecurity Leaders - MERLIN NAMUTH
39:01
So You WANT TO DO Google Cloud Threat Detection - Start here!
26:59
Using Data Perimeters in AWS To Scale Guardrails
37:09
AWS INCIDENT RESPONSE - Automate Containment
17:00
"Hot Takes" with CISOs & CyberSecurity Leaders - Srinath Kuruvadi
20:45
"Hot Takes" with CISOs & CyberSecurity Leaders - Caleb Sima
01:48
CYBERSECURITY LEADERS EATING HOT SAUCE ๐ŸŒถ๏ธ๐Ÿ˜… - Teaser
04:55
AWS ReInforce 2023 - Keynote Highlights IN LESS THAN 5 MINS
27:25
Will Application Security Eat Cloud Security for Lunch!
14:12
CAN LLMs BE ATTACKED!
14:28
What is DevSecOps | DevSecOps with Cloud & AI explained for 2023
55:24
Evolution of Kubernetes Security | KubeCon EU 2023
31:31
A DEV FRIENDLY CLOUD NATIVE SECURITY PIPELINE!
05:21
RSA CONFERENCE 2023 RECAP IN 5 Minutes
32:17
THEY SCANNED ENTIRE GITHUB FOR SECRETS AND FOUND THIS!
01:01
Lack of IAM Control explained!
41:29
Kubernetes Cluster Security Audit Explained
21:26
AWS CloudFormation Security Best Practices
40:12
Network Security for Kubernetes
13:20
CI CD Pipeline SECURITY EXPLAINED FOR AWS
16:22
CHATGPT vs GOOGLE BARD TO CREATE AWS RESOURCES WITH TERRAFORM
58:02
CONTINUOUS KUBERNETES SECURITY IN 2023
47:40
2023 What Kubernetes Security Looks Like Today Series- DevSecOps
21:22
How To Securely Host a Website on AWS with a Custom Domain
50:58
IS THERE DEVSECOPS IN CLOUD? ๐Ÿค”
25:50
Amazon ECS Security Best Practices
24:28
How to use Amazon DynamoDB for security and speed
59:01
How to Build a Modern Cyber Security Program in 2023
19:02
Securing Your Amazon RDS Postgres Database