All Episodes
SilverLining IL — 59 episodes
SilverLining Episode 59: Understanding the six pillars of DevSecops
SilverLining Episode 58: Quantum computing security challenges - CSA QSS working group
SilverLining Episode 57: How CISO’s should utilize cyber security startups
SilverLining Episode 56: Researching Cloud giants security mechanisms
SilverLining Episode 55: Analyzing SaaS Applications Threats
SilverLining Episode 54: Threats on CI/CD pipeline
SilverLining Episode 53: Automating Infrastructure Pipelines
SilverLining Episode 52: Securing K8’s Deployments
SilverLining Episode 51: Understanding 5G Networks
SilverLining Episode 50: Building security workflow at scale
SilverLining Episode 49: Security for Fintech Companies
SilverLining Episode 48: Deep dive into Confidential computing
SilverLining Episode 47: Understanding Service Mesh Technologies
SilverLining Episode 46: Securing Small & Medium businesses
SilverLining Episode 45: Incident response at scale
SilverLining Episode 44: Gaining cloud security knowledge & certification - Part 2
SilverLining Episode 43: Gaining cloud security knowledge & certification
SilverLining Episode 42: How to mature devsecops operations
SilverLining Episode 41: Securing ci/cd pipeline using policy as code
SilverLining Episode 40: Protecting SaaS services using automation & continuous monitoring
SilverLining Episode 39: Securing API Services
SilverLining Episode 38: Cloud Native Security Foundations
SilverLining Episode 37: Software Package Dependencies Attacks
Episode 36: Wiz
Episode 35: Compliance Automation and Zero Trust Containers
Episode 34: PayPal cloud journey
Episode 33: Researching Cloud Vulnerabilities
Episode 32: Understanding Infrastructure as Code and How to Use it Effectively
Episode 31: Understanding Cloud Native Security Basics
Episode 30: The challenges of CISO in a security company
Episode 29: Cloud Identity Governance - understanding challenges
Episode 28: Analyzing Cloud Attack Vectors - SaaS Marketplaces and Office 365 BEC
Episode 27: Protecting Your Cloud Data With Legal Controls
Episode 26: Current Challenges With Cloud
Episode 25: From Excessive Permissions To Least Privileges - Automating Your IAM Roles
Episode 24: Putting The Sec Into DevOps
Episode 23: Understanding Microsoft Cloud Security Pillars
Episode 22: How To Do Add Open Source Code To Your Applications, Securely
Episode 21: Building The Next Generation Of Cloud Services
Episode 20: The Dark Side Of Privacy
Episode 19: Understanding Cloud Attack Vectors
Episode 18: Testing Cloud Application
Episode 17: How to do penetration testing in cloud application
Episode 16: Merging Cloud Based Startup Into Financial Giants
Episode 15: Challenges Of Selecting SaaS Providers
Episode 14: DevOps Secret Management
Episode 13: Creating Trust & Awareness
Episode 12: Diving Into Authorization And Policy Bases Access Controls
Episode 11: IoT Security Basics
Episode 10: Securing The New Fintech Economy
Episode 9: Challenges With Cloud Management Logs
Episode 8: Securing The World of IoT
Episode 7: Creating Trust in Cloud
Episode 6: The Cloud Octagon Model Framework for Cloud Adoption
Episode 5: Guard Rails And Not Gates – How R&D And Security Should Co-Exist Audio Player
Episode 4: Kubernetes On Steroids
Episode 3: Cloud Configuration Pitfalls
Episode 2: Security Challenges Of Moving From Monolith To Micro-Services
Episode 1: Security Challenges With The Growing World Of Serverless Functions