Channel Avatar

Cloud Security Podcast @UC8jQKdbAHbv7LuIQOxN_mqQ@youtube.com

18K subscribers - no pronouns :c

Cloud Security Podcast is a community first WEEKLY VIDEO POD


25:32
State of Cloud Security 2024 - Leadership Edition
09:05
Streamlining AWS Cloud Access Controls for Human and Non Human Identities - AWS IAM Access Analyzer
21:57
Cloud Native Strategies from a FinTech CISO
21:26
Fixing Cloud Security with AWS Lambda
22:11
What is confidential computing? Explained for 2024
24:49
The role of Application Security in 2024
27:47
The Evolution of Infrastructure as Code so far - 2024 Edition
23:29
What is AI-SPM?
33:56
Proactive Security Strategies for AI Integration
21:10
Why Identity and Edge Security Matters for Cloud Security?
22:22
Creating Effective Sigma Rules with AI
10:13
CODE TO CLOUD TO SOC
07:55
5 MAJOR TRENDS FROM RSA CONFERENCE 2024 IN 5 MINS
23:10
What is the future of security operations with AI in 2024?
34:25
AI's Impact on Real-World Problems | Kelsey Hightower
31:01
Cloud Native Security Strategies for 2024
16:13
How can we improve developer security with AI in 2024?
11:22
How can AI improve Security Operations and Cloud Security in 2024?
21:03
Scaling DevSecOps for Cloud in 2024
59:24
Real-World Cloud Security Challenges and Solutions Explained for 2024
26:46
Why Least Privilege Matters in Cloud Security?
20:20
How is Kubernetes Network Security Evolving?
22:39
Understanding Google Cloud Security Fundamentals
38:17
The Future of Software Development with AI
21:36
The role of Real Time Defense in Cloud Security
49:00
CISO's guide to Embracing Risk in Business
30:03
Why Email Breaches Still Happen?
45:50
Essential Strategies to master Incident Response in Cloud
12:35
Securitng the Kubernetes Supply Chain
21:24
From Code Suggestions to Security
35:50
Cloud Security Operations for Modern Threats
07:59
AWS IAM Access Analyzer Explained
50:07
Understanding Threat Modeling in Cloud
16:12
AWS Cloud Security Strategies for 2024
17:57
Balancing Efficiency & Security: AI’s Transformation of Legal Data Analysis
19:56
Cloud Security Programs with AWS Security Services
21:38
From Zero to Hero in Devops
15:33
Sidecar Container Vulnerability in Kubernetes explained
40:10
What is the role of application security posture management in cybersecurity?
30:00
Cybersecurity Best Practices and Password Security in Cloud and AI
27:30
Multicloud strategy for AWS and GCP
20:08
AI's Role in Security Efficiency - Kubernetes Edition
48:56
Build an Effective AWS Cloud Security Program in 2024
22:33
Offensive Cloud Security Program for 2024
27:17
Understand Your Cloud Security Landscape to cut through the noise!
33:12
Kubernetes Security Trends 2024 | Software Supply Chain Security, Zero Trust and AI
26:23
Kubernetes Network Security for Multi Tenancy
56:01
AWS ReInvent 2023 - All Security highlights & Announcements
23:24
eBPF - Kubernetes Network Security without the Blind Sides!
21:14
Attack Path Analysis for Better Kubernetes Security
42:44
Secure your SaaS applications like this!
34:45
Threat Detection for not so common Cloud Services
29:01
Have I lost my Secrets?
12:52
Prisma Cloud Darwin : CISO Reaction
59:02
How to Escape Clusters in a Managed Kubernetes Cluster?
36:13
Cloud Security Tools from Cloud Pentest Lab | DeRF |Stratus Red Team
39:13
Cloud pentesting lab and walkthrough | cloudfoxable
15:00
HashiConf 2023: Everything revealed in 15 Minutes
33:12
How to become a Senior Cloud Security Engineer?
15:46
5 Skills to Level Up Your Cloud Hacking