Archive
Securing AI Applications in Cloud: What are We Really Securing?
As organizations increasingly integrate AI into their cloud environments, security teams face a new challenge: securing AI-driven applications while ensuring innovation isn't stifled. But what does securing AI really mean? Is it about securing the cloud infrastructure running AI workloads, the AI models themselves, or the applications utilizing AI? This week, we explore AI Bill of Materials (AIBOM), shadow AI risks, and 4 Steps you can take to Secure your AI systems without blocking innovation.

Why AWS Anti-Patterns Might Be Your Next Cloud Security Superpower!
Are Anti-Patterns the New Best Practices in AWS Cloud Network Security? Explore how AWS anti-patterns like centralized VPC endpoints and flipped NAT setups can boost cloud security. Experts Jack Harter, Kyler Middleton, Meg Ashby, and Brian McHenry share insights on bending vendor rules for compliance, cost, and prevention in this week’s Cloud Security Newsletter.

2025 Guide to Cloud Pentesting: AWS & Azure Edition
Cloud penetration testing has evolved beyond simple configuration reviews to comprehensive security assessments. Our experts Nick Jones (WithSecure), Karl Fosaaen (NetSPI), and Seth Art (Datadog) share insights on the critical differences between web application and cloud pentesting, the central role of identity in cloud security, and common attack vectors. Learn why cloud-specific expertise matters when selecting pentesting partners, how to scope engagements effectively based on account and service complexity, and practical considerations for collaborative pentesting.

Microsoft Azure Security: From Incident Response to Proactive Defense
Whether you're managing a hybrid environment, responding to incidents, or building security controls, understanding Azure's distinct security model is crucial for effective cloud security. This issue contains practical insights on navigating the complexities of Azure identity, implementing proactive security measures, and building effective incident response capabilities.

Netflix's Identity First - AWS Cloud Security Evolution!
How Netflix Scaled AWS Security by breaking Traditional Account Boundaries & starting with Identity instead of Infrastructure. Netflix's Bold Take on re-thinking AWS Multi-Account Security at Scale beyond Least Privilege using identity isolation allowed them to be developer friendly at their scale.

Changing Data Security in Cloud : Beyond Traditional DLP, Runtime with SOC, and Data Protection
Your Cloud Security Strategy is About to Change - Here's What's Coming in 2025 especially as Cloud Environments become more complex with AI & Kubernetes on Serverless, here's what will be reshaping your security landscape in 2025:

3 Public Cloud Security Incidents That Changed Everything!
Cloud Security today in 2025 is a lot more mature with many professional with certifications from one or more cloud providers. This was not always the case. Today we are looking back at the 3 Public Cloud Security Incidents that changed the way everything

5000 CyberSecurity Vendors for 3 Cloud Service Providers Problem 👀
CyberSecurity vendors and analysts loves acronyms to define a "new" security problem that we discover as unique enough to solve in most organizations but sometimes this is the exact reason why we end up in spaghetti solutions instead of the right one for the right problem.

Top 3 - Cloud Security Predictions for Cloud & AI built on Cloud!
After over 50+ conversations with Cloud Security and AI CyberSecurity Experts over 2024. We finally have our Top 3 Predictions for Cloud and AI built on Cloud for 2025! You are the first one to read it! 🤫 This will be shared publicly next week from Cloud Security Podcast! So please keep this to yourself and people close to you until then! Enjoy!
