PodParley PodParley
SilverLining IL cover art

All Episodes

SilverLining IL — 59 episodes

#
Title
1

SilverLining Episode 59: Understanding the six pillars of DevSecops

2

SilverLining Episode 58: Quantum computing security challenges - CSA QSS working group

3

SilverLining Episode 57: How CISO’s should utilize cyber security startups

4

SilverLining Episode 56: Researching Cloud giants security mechanisms

5

SilverLining Episode 55: Analyzing SaaS Applications Threats

6

SilverLining Episode 54: Threats on CI/CD pipeline

7

SilverLining Episode 53: Automating Infrastructure Pipelines

8

SilverLining Episode 52: Securing K8’s Deployments

9

SilverLining Episode 51: Understanding 5G Networks

10

SilverLining Episode 50: Building security workflow at scale

11

SilverLining Episode 49: Security for Fintech Companies

12

SilverLining Episode 48: Deep dive into Confidential computing

13

SilverLining Episode 47: Understanding Service Mesh Technologies

14

SilverLining Episode 46: Securing Small & Medium businesses

15

SilverLining Episode 45: Incident response at scale

16

SilverLining Episode 44: Gaining cloud security knowledge & certification - Part 2

17

SilverLining Episode 43: Gaining cloud security knowledge & certification

18

SilverLining Episode 42: How to mature devsecops operations

19

SilverLining Episode 41: Securing ci/cd pipeline using policy as code

20

SilverLining Episode 40: Protecting SaaS services using automation & continuous monitoring

21

SilverLining Episode 39: Securing API Services

22

SilverLining Episode 38: Cloud Native Security Foundations

23

SilverLining Episode 37: Software Package Dependencies Attacks

24

Episode 36: Wiz

25

Episode 35: Compliance Automation and Zero Trust Containers

26

Episode 34: PayPal cloud journey

27

Episode 33: Researching Cloud Vulnerabilities

28

Episode 32: Understanding Infrastructure as Code and How to Use it Effectively

29

Episode 31: Understanding Cloud Native Security Basics

30

Episode 30:  The challenges of CISO in a security company

31

Episode 29: Cloud Identity Governance - understanding challenges

32

Episode 28: Analyzing Cloud Attack Vectors - SaaS Marketplaces and Office 365 BEC

33

Episode 27: Protecting Your Cloud Data With Legal Controls

34

Episode 26: Current Challenges With Cloud

35

Episode 25: From Excessive Permissions To Least Privileges - Automating Your IAM Roles

36

Episode 24: Putting The Sec Into DevOps

37

Episode 23: Understanding Microsoft Cloud Security Pillars

38

Episode 22: How To Do Add Open Source Code To Your Applications, Securely

39

Episode 21: Building The Next Generation Of Cloud Services

40

Episode 20: The Dark Side Of Privacy

41

Episode 19: Understanding Cloud Attack Vectors

42

Episode 18: Testing Cloud Application

43

Episode 17: How to do penetration testing in cloud application

44

Episode 16: Merging Cloud Based Startup Into Financial Giants

45

Episode 15: Challenges Of Selecting SaaS Providers

46

Episode 14: DevOps Secret Management

47

Episode 13: Creating Trust & Awareness

48

Episode 12: Diving Into Authorization And Policy Bases Access Controls

49

Episode 11: IoT Security Basics

50

Episode 10: Securing The New Fintech Economy

51

Episode 9: Challenges With Cloud Management Logs

52

Episode 8: Securing The World of IoT

53

Episode 7: Creating Trust in Cloud

54

Episode 6: The Cloud Octagon Model Framework for Cloud Adoption

55

Episode 5: Guard Rails And Not Gates – How R&D And Security Should Co-Exist Audio Player

56

Episode 4: Kubernetes On Steroids

57

Episode 3: Cloud Configuration Pitfalls

58

Episode 2: Security Challenges Of Moving From Monolith To Micro-Services

59

Episode 1: Security Challenges With The Growing World Of Serverless Functions