- Cloud Security Newsletter
- Archive
- Page 1
Archive
Netskope $5 Billion Potential IPO & AI-Powered Threats Meet Traditional Security Gaps: When Copilots Become Attack Vectors
This week's newsletter examines the explosive growth of AI security risks in enterprise environments, featuring expert insights on how Microsoft Copilot and agentic AI are fundamentally changing the threat landscape. We also cover critical zero-day exploitations, nation-state campaigns targeting cloud infrastructure, and the largest healthcare data breaches of 2025.

$4B Cloud Security Consolidation Move & The AI Security Revolution Continues: AI-Powered Detection & Response Meets Enterprise Reality
This week's newsletter explores how AI transforms cloud security operations through practical detection engineering insights from Anthropic and Canva security leaders, while analyzing major industry consolidation moves and critical vulnerabilities affecting enterprise cloud infrastructure.

AI Native Security: Securing the Future as Applications Evolve with AI | Google Cloud Functions Vulnerability
This week's newsletter explores how AI is reshaping enterprise security architecture, with expert insights from Ankur Shah of Straiker. From unstructured data challenges to the rise of AI agents, cloud security leaders must understand why traditional security approaches are no longer sufficient for protecting AI-enabled applications.


Cloud Transition Challenges - From Posture Management to AI-Ready SOCs
This week's newsletter explores the evolving landscape of cloud security with insights from Palo Alto Networks executive Elad Koren. We cover critical developments including SAP zero-day patches, Kubernetes service account token integration, vulnerable Helm charts, and Steam's alleged 2FA breach, while examining how security operations centers must evolve to handle cloud-native incidents.

Cloud Security Rundown: RSA Highlights, UK Retail Sector Under Siege, and Shadow AI Risks
Discover key CyberSecurity insights from RSA Conference 2025, including AI-native security tools, runtime protection strategies, and emerging shadow AI risks. Plus, analysis of major UK retail cyberattacks and how cloud security teams should respond to these evolving threats.

Container Security: Building Fortified Foundations with Minimal Attack Surfaces + pre-RSA 2025
Discover how leading cloud security experts are revolutionizing container security by leveraging minimal images, immutable infrastructure, and developer-friendly tools. This week's newsletter reveals practical strategies to reduce attack surfaces, automate security controls, and implement the "shift down" philosophy for securing containerized workloads at scale.

CVE Program Saved, 1200 AWS Access Key Compromised, & Mastering Cloud Incident Response
This week, we focus on MITRE's CVE program gets last-minute funding extension, Major AWS S3 ransomware campaign uses stolen credentials and expert strategies for effective multi-cloud incident response from Fortune 500 security leaders.

Attacker Stealth Tactics in Azure and Ransomware still Threatening Organizations
This week we uncover Azure security blindspots in our latest newsletter featuring experts Christian Philipov (WithSecure) and Katie Knowles (Datadog). Learn how attackers exploit Azure's limited read-event logging for stealthy reconnaissance, plus practical defenses using conditional access policies and Resource Graph Explorer. Also covers breaking news on Microsoft's ransomware-related zero-day patch, pension fund breaches, and critical SAP vulnerabilities. Essential insights for cloud security professionals defending Azure environments.

Google Cloud Run ImageRunner Vulnerability & Tackling Kubernetes Network Security Across Multiple Cloud Providers
This week we examine recently discovered vulnerabilities in GCP Cloud Run, AWS S3, and Azure VM deployment, alongside expert insights from Confluent's Kubernetes team on implementing Cilium across multiple clouds. Learn how cloud-specific networking challenges can be overcome while enhancing security posture through eBPF-powered protection, with practical guidance for security professionals managing containerized workloads.

Kubernetes Nightmare of Vulnerabilities & Building Detection Engineering Excellence
Critical Kubernetes vulnerabilities (CVSS score 9.8 🫣 ) threaten thousands of clusters while detection engineering practices gain importance as more vulnerabilities continue to get announced. Learn how to protect your environment from IngressNightmare CVEs and implement Detection as code strategies from Google Cloud's security experts.

24hrs into Google's $32B Acquisition of Wiz - What It Means for Cloud Security
Google's $32B acquisition of Wiz reshapes cloud security landscape. Leading experts analyze implications for multi-cloud strategies, vendor lock-in concerns, and the evolution of CSPM/CNAPP to runtime security. Essential insights for CISOs and security teams navigating this industry-transforming deal.

Securing AI Applications in Cloud: What are We Really Securing?
As organizations increasingly integrate AI into their cloud environments, security teams face a new challenge: securing AI-driven applications while ensuring innovation isn't stifled. But what does securing AI really mean? Is it about securing the cloud infrastructure running AI workloads, the AI models themselves, or the applications utilizing AI? This week, we explore AI Bill of Materials (AIBOM), shadow AI risks, and 4 Steps you can take to Secure your AI systems without blocking innovation.
