All Episodes
Displaying 61 - 80 of 99 in total
Episode 62 — Open-Source Dependencies: Risk Management and Updates
Modern applications rely heavily on open-source libraries and frameworks, which can accelerate innovation but also expand the attack surface. In this episode, we analy...

Episode 63 — Static Analysis: SAST Practices for Cloud Apps
Static Application Security Testing (SAST) analyzes source code or binaries to identify vulnerabilities before software is deployed. In this episode, we explain how SA...

Episode 64 — Dynamic & Interactive Testing: DAST and IAST in CI/CD
Dynamic Application Security Testing (DAST) examines applications while they are running, simulating external attacks to uncover vulnerabilities that may not appear in...

Episode 65 — Runtime Protections: Behavior Monitoring and Application Shielding
Even well-tested applications face threats once deployed, making runtime protection essential. This episode covers technologies that monitor application behavior in re...

Episode 66 — Serverless Apps: Event Injection and Least Privilege Design
Serverless applications offer scalability and efficiency but bring unique risks. In this episode, we explore how event-driven models introduce vulnerabilities such as ...

Episode 67 — Containerized Apps: Image, Registry and Runtime Controls
Containers bundle applications and dependencies, but their security depends on careful control across the lifecycle. This episode examines how images are built, stored...

Episode 68 — Configuration Management: Feature Flags and Secure Defaults
Configuration management ensures that applications run consistently and securely across environments. In this episode, we explore how feature flags, environment variab...

Episode 69 — DevSecOps: Pipelines, Gates and Automated Policy
DevSecOps integrates security into every stage of the development and delivery process. This episode explains how pipelines enforce security gates, how automated polic...

Episode 70 — Secure Delivery: Blue/Green, Canary and Rollback Safety
Delivery strategies determine how applications are released into production, and security must be considered at every step. In this episode, we compare blue/green depl...

Episode 71 — Domain 5 Overview: Cloud Security Operations
Domain 5 introduces the operational side of cloud security, where the focus shifts from architecture and design to the day-to-day activities that ensure systems remain...

Episode 72 — Monitoring Strategies: Metrics, Logs and Traces in Cloud
Effective monitoring is at the heart of cloud security operations, providing the visibility required to detect, analyze, and respond to threats. In this episode, we di...

Episode 73 — SIEM & Analytics: Ingesting and Correlating Cloud Telemetry
Security Information and Event Management (SIEM) systems remain a cornerstone of security operations, but in the cloud, they must adapt to ingest vast amounts of telem...

Episode 74 — Cloud Posture Management: Misconfiguration Detection and Drift
Cloud Security Posture Management (CSPM) addresses one of the leading causes of breaches: misconfiguration. In this episode, we explore how CSPM tools automatically de...

Episode 75 — SOAR Playbooks: Automation for Detection and Response
Security Orchestration, Automation, and Response (SOAR) platforms transform operations by codifying response actions into playbooks. This episode explains how triggers...

Episode 76 — Incident Response: Cloud-Specific Triage and Containment
Incident response in the cloud requires adapting traditional processes to dynamic, distributed environments. This episode covers how cloud-specific triage differs from...

Episode 77 — Forensics in Cloud: Acquisition, Chain of Custody and Tools
Forensics in the cloud is complicated by lack of physical access, but it remains essential for investigations. This episode examines how evidence is acquired from clou...

Episode 78 — Change Management: Guardrails, Approvals and Exceptions
Change management ensures that updates to cloud environments are controlled, predictable, and secure. In this episode, we explore how guardrails, approval workflows, a...

Episode 79 — Configuration Management: Baselines and Continuous Compliance
Configuration management goes hand in hand with posture and change management, ensuring systems remain aligned with secure baselines. This episode discusses how baseli...

Episode 80 — Vulnerability Operations: Prioritization and Remediation at Scale
Vulnerability operations extend beyond scanning, focusing on how findings are prioritized, tracked, and remediated across thousands of resources. This episode covers h...

Episode 81 — Key & Secret Operations: Rotation, Expiry and Escrow
Keys and secrets are not static assets; they must be actively managed to maintain security. In this episode, we explore operational practices such as regular rotation,...
