Cybersecurity Best Practices and Password Security in Cloud and AI

Cybersecurity Best Practices and Password Security in Cloud and AI

We caught up with Troy Hunt and Scott Helme at NDC Security Oslo 2024 to talk about best practices when it come to decoding TLS, password security and data breaches in cloud and AI.

Troy Hunt, known for his work with haveibeenpwned.com, spoke to us about the complexities of cloud deployment and paradox of data input versus privacy risk in Large Language Models (LLMs), Cloud. Scott Helme, a security researcher and founder of securityheaders.com, spoke about the importance of early security training in the development lifecycle for applications built in 2024. We dissected the critical yet often overlooked aspects of cybersecurity in cloud and ai.


Guest Socials: Troy Hunt + Scott Helme

Podcast Twitter - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠

If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:

- ⁠⁠⁠⁠⁠⁠Cloud Security Podcast- Youtube⁠⁠⁠⁠⁠⁠

- ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Newsletter ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠

- ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security BootCamp⁠⁠


Questions asked:

(00:00) Introduction

(01:37) Evolving Landscape of Password Management

(04:17) Analyzing Data Breach Trends:

(05:48) Latest Security Protocols with TLS and Encryption

(08:24) Debating Encryption Key Management

(10:59) AI's Role in Data Breaches:

(13:59) Best Practices for Enterprise Password Management

(16:01) Best Practices for Password Management in Small to Medium Sized Businesses

(18:04) Top 5 security best practices

(19:58) Understanding Security Headers

(27:14) The Fun Section

Jaksot(344)

Compliance as Code in Kubernetes

Compliance as Code in Kubernetes

In this episode of the Virtual Coffee with Ashish edition, we spoke with Jim Bugwadia (Jim's Twitter) about policy management and compliance as code for Kubernetes and how you can use open source tool...

24 Loka 202246min

Software Signing for Kubernetes Supply Chain & Everybody Else

Software Signing for Kubernetes Supply Chain & Everybody Else

In this episode of the Virtual Coffee with Ashish edition, we spoke with Luke Hinds (Luke's Twitter) the open source Sigstore project and how it is helping with software signing and protecting the sof...

16 Loka 202250min

KUBERNETES BEST PRACTICES 2022

KUBERNETES BEST PRACTICES 2022

In this episode of the Virtual Coffee with Ashish edition, we spoke with Jimmy Mesta (Jimmy's Twitter) about OWASP Kubernetes Top 10 and best practices for securing Kubernetes Episode ShowNotes, Link...

10 Loka 202250min

Building Blocks of a Modern Cloud Security Program

Building Blocks of a Modern Cloud Security Program

Modern Cloud Security Programs hire for builders who can develop tools that help developers walk down a Paved road where security is not a blocker but at the same time prevents developers from making ...

29 Syys 202239min

THIS IS MY Cloud SECURITY ARCHITECTURE - Azure Security Best Practices - Part 2

THIS IS MY Cloud SECURITY ARCHITECTURE - Azure Security Best Practices - Part 2

Azure Cloud Security Architecture (Day 0) ,Custom Azure Role definitions, Azure Privilege Access Management etc can be complex to build. Continuing from part 1 In the part 2 of our This is My Cloud Se...

25 Syys 20221h 4min

SecDataOps Explained - Modern Security Stack

SecDataOps Explained - Modern Security Stack

Data Lakes as an asset to collect and build threat actors or hiring for Data Scientists/Analyst are not typical things in Cloud Security well unless the organisation is dealing with PetaBytes of data....

16 Syys 202247min

THIS IS MY Cloud SECURITY ARCHITECTURE - Azure Security Best Practices - Part 1

THIS IS MY Cloud SECURITY ARCHITECTURE - Azure Security Best Practices - Part 1

Azure Cloud Security Architecture, Azure Policies can be complex to build. In the part 1 of our This is My Cloud Security Architecture Series Episode we have Sai, a Cloud Security Architect walking us...

12 Syys 202255min

Cloud Security Monitoring in a Modern Security Stack

Cloud Security Monitoring in a Modern Security Stack

In this episode of the Virtual Coffee with Ashish edition, we spoke with Jack Naglieri (Jack's Twitter) about what Security Monitoring can look like for a Cloud Native Company Episode ShowNotes, Link...

8 Syys 202236min