All Episodes

Displaying 61 - 80 of 88 in total

Episode 61 — Protect administrative network services so management planes stay isolated and controlled

This episode explains why administrative network services are a high-leverage target and how isolating management planes reduces the chance that a single workload comp...

Episode 62 — Network security monitoring in the cloud: choose signals that reveal attacker movement

This episode teaches how to select network monitoring signals that actually expose attacker behavior, rather than collecting traffic data that cannot answer investigat...

Episode 63 — Detect identity abuse by correlating logins, token use, and privilege changes

This episode focuses on identity abuse as a primary cloud attack pattern and shows how correlation across authentication, token activity, and privilege events produces...

Episode 64 — Detect lateral movement by monitoring network flows, service calls, and unusual access paths

This episode explains lateral movement in cloud environments as a combination of connectivity, identity, and service-to-service behavior, and it prepares you for GCLD ...

Episode 65 — Detect data exfiltration attempts using volume baselines, destination analysis, and timing

This episode teaches how to detect exfiltration attempts by focusing on measurable behaviors—how much data moves, where it goes, and when it happens—rather than relyin...

Episode 66 — Tune detections to reduce noise while keeping high-confidence cloud security alerts

This episode focuses on alert quality as a governance outcome, because noisy detections create fatigue, missed incidents, and poor credibility with stakeholders—topics...

Episode 67 — Investigate alerts with cloud context to decide benign behavior versus true compromise

This episode teaches how to investigate cloud alerts using context that turns raw events into a defensible conclusion, which aligns with GCLD expectations for decision...

Episode 68 — Secure compute deployment: harden images, reduce services, and enforce patch cadence

This episode focuses on compute deployment security as a lifecycle discipline, not a one-time configuration, and it supports GCLD questions that test how leaders build...

Episode 69 — Use immutable infrastructure patterns to shrink the window for persistent compromise

This episode explains immutable infrastructure as a strategy for reducing persistence opportunities by replacing systems instead of repairing them in place, which is a...

Episode 70 — Validate compute security with baselines, policy enforcement, and continuous posture checks

This episode teaches how to validate that compute security remains true over time by combining baselines, enforceable policies, and continuous checks that detect drift...

Episode 71 — Apply runtime protections that limit execution, persistence, and privilege inside workloads

This episode explains runtime protections as the controls that operate while workloads are running, not just during build or deployment, and it ties directly to GCLD q...

Episode 72 — Secure serverless and managed compute by controlling permissions, triggers, and inputs

This episode focuses on how serverless and managed compute shift risk from host hardening to identity, configuration, and event integrity, which is a common trap in go...

Episode 73 — Containers and cloud storage: secure container builds from source to registry to runtime

This episode teaches the end-to-end container supply chain, emphasizing that container security is not a single scan but a controlled path from source code to build sy...

Episode 74 — Enforce image hygiene by scanning, signing, and blocking risky dependencies

This episode explains image hygiene as a set of enforceable practices that reduce exploitable weaknesses before workloads ever run, and it aligns with GCLD questions a...

Episode 75 — Isolate containers using least privilege runtime settings and strong boundary controls

This episode focuses on container isolation as a runtime governance outcome, not a promise implied by “it’s containerized,” and it prepares you for exam items that tes...

Episode 76 — Protect cloud storage with encryption, access policies, and safe sharing defaults

This episode explains how to secure cloud storage using layered controls that prevent accidental exposure and reduce the impact of credential misuse, which is a recurr...

Episode 77 — Prevent public bucket mistakes by validating policies, ACLs, and inherited permissions

This episode focuses on one of the most common cloud failure patterns: storage resources becoming public due to misunderstood configuration, rushed changes, or inherit...

Episode 78 — Control object lifecycle and versioning to support recovery, accountability, and integrity

This episode explains object lifecycle and versioning as governance tools that support recovery and accountability, not just cost management features, and it aligns wi...

Episode 79 — Discovering sensitive data: classify what matters and reduce unknown data sprawl

This episode focuses on data discovery as the starting point for meaningful protection, because you cannot secure what you do not know exists, and the GCLD exam expect...

Episode 80 — Find sensitive data in storage, databases, logs, and object metadata consistently

This episode teaches how to search for sensitive data consistently across the places it often hides, including object storage, databases, application logs, and metadat...

Broadcast by