

Cloud Security Podcast
TechRiot.io
Learn Cloud Security in Public Cloud and for AI systems, the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We are honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud.
We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security.
We STREAM interviews on Cloud Security Topics every week on Linkedin, YouTube and Twitter with over 150K people tuning in.
We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security.
We STREAM interviews on Cloud Security Topics every week on Linkedin, YouTube and Twitter with over 150K people tuning in.
Episodes
Mentioned books

Mar 10, 2026 • 46min
Browser Security Explained: Consent Phishing, "Click Fix" Attacks & The Limits of EDR
Adam Bateman, security researcher and CEO of Push Security with red‑team roots. He explores browser‑native attacks and why treating IDPs like firewalls is risky. Topics include consent phishing that hijacks Azure, click‑fix clipboard attacks, the shift to identity‑first adversaries, and limits of EDR and SSPM in SaaS/Chromebook environments.

Mar 6, 2026 • 40min
Is AI Hallucinations a Myth and the Real Threat from AI
Edward Wu, Founder and CEO of Dropzone AI, builds AI agents that automate SOC triage for cybersecurity teams. He discusses how attackers currently use LLMs for reconnaissance and spear-phishing. He explains why major commercial models restrict exploit generation. He describes AI agents already automating massive volumes of alert investigations and reframes hallucinations as context failures.

Feb 20, 2026 • 34min
Why AI Infrastructure is Harder to Secure Than Cloud
Toni (Tony) De La Fuente, creator of the open-source tool Prowler with 25+ years in security, joins to unpack AI infrastructure risks. He explains why AI workloads differ from cloud, the shared responsibility gap in managed AI services, dangers of default MCP setups, and why generated IaC and multi-party AI stacks create new blind spots.

Feb 10, 2026 • 47min
How Attackers Bypass AI Guardrails with Natural Language
Eduardo Redondo Garcia, Global Head of Cloud Security Architecture at Check Point with decades in security and AI fraud detection. He discusses how natural language becomes an attack vector, prompt injection and runtime defenses, risks from Shadow AI and third-party models, scaling social engineering with GenAI, and tackling deepfakes and biometric bypasses.

10 snips
Feb 6, 2026 • 40min
Vulnerability Management vs. Exposure Management
Brad Hibbert, COO and Chief Strategy Officer at Brinqa with 20+ years in security, talks about the shift from traditional vulnerability approaches to exposure management. He covers cloud-driven complexity, the difference between service owners and remediation teams, how AI sharpens prioritization, and when automation is safe. Practical steps for starting small and aligning incentives are discussed.

10 snips
Feb 5, 2026 • 1h 3min
Is Developer Friendly AI Security Possible with MCP & Shadow AI
Bryan Woolgar-O'Neil, CTO and co-founder of Harmonic Security, focuses on secure AI adoption and developer-friendly AI governance. He discusses why blocking developer tools fails and why many MCP servers run locally. He explains MCP and Harmonic’s gateway approach, argues for coaching engineers in real time instead of blunt blocking, and predicts small specialized models will win for business tasks.

41 snips
Jan 21, 2026 • 52min
Why AI Can't Replace Detection Engineers: Build vs. Buy & The Future of SOC
Antoinette Stevens, Principal Security Engineer at Ramp, brings her expertise in detection engineering to a lively discussion about the role of AI in security operations. She emphasizes the importance of human judgment over AI's limitations, such as hallucinations. Antoinette advocates for an engineering-led approach and warns about the shrinking entry-level job market, pushing for software skills in security roles. The conversation covers the necessity of building robust detection programs while treating AI as a supportive tool, not a replacement. Plus, she shares her personal interests, from wine certification to comedy!

Jan 13, 2026 • 41min
AI Vulnerability Management: Why You Can't Patch a Neural Network
Join Sapna Paul, a Senior Manager at Dayforce with a robust background in cybersecurity and DevSecOps, as she unpacks the complexities of AI vulnerability management. Discover why traditional patching doesn’t apply to neural networks and delve into the three critical layers of AI vulnerabilities. Sapna highlights the importance of aligning AI risks with business goals and shares practical ways to use AI to combat alert fatigue. She also emphasizes mentoring and the essential skills needed for security professionals in an evolving AI landscape.

Dec 16, 2025 • 37min
Why Backups Aren't Enough & Identity Recovery is Key against Ransomware
Matt Castriotta, Field CTO at Rubrik, shares insights on the vital need for cyber resilience over traditional backup strategies. He emphasizes that merely having backups is insufficient; organizations must recover clean, trusted data after attacks. Matt warns against the myths of cloud-native recovery like S3 versioning and elaborates on why identity must be the new perimeter in security. The conversation also covers AI's role in data integrity, offering practical advice on incident response and recovery planning.

Dec 9, 2025 • 55min
How to secure your AI Agents: A CISOs Journey
Yash Kosaraju, CISO of Sendbird, shares insights from transforming the company from a chat API platform to an AI agent powerhouse. He introduces the concept of 'Multi-Layer Trust' as a more pragmatic approach than the traditional 'Zero Trust.' The discussion spans critical topics like securing AI interactions, the blurred lines of incident response when AI agents operate across boundaries, and the benefits of embedding security directly into development teams. Yash also emphasizes the importance of empowering employees with enterprise AI tools while maintaining a robust security culture.


