Beyond the Perimeter: Inside the Cloud Threat Landscape
This episode provides a comprehensive overview of evolving cloud threats, highlighting how adversaries weaponize legitimate cloud tools, identities, and artificial intelligence services to compromise modern environments.
π§ Listen to this Episode
Show Notes
Threat actors are increasingly abandoning traditional malware in favor of exploiting valid credentials and native cloud services to move laterally and execute destructive attacks. This episode explores the latest cloud security trends, including the rise of cloud-native ransomware, the abuse of AI and LLM supply chains, and how attackers leverage third-party integrations to breach multiple tenants. Join us as we unpack the strategies defenders must adopt, such as strict identity and access management (IAM) hardening and behavioral monitoring, to secure modern hybrid cloud environments.
Β
Sponsors:
Β
Share this episode
Enjoying CISO Insights?
Subscribe to get new episodes delivered directly to your podcast app.
Related Episodes
The 2026 Cyber Insurance Shift: AI, Exclusions, and the Resilience Mandate
A comprehensive guide to understanding how artificial intelligence, new data privacy regulations, and evolving cyber threats are fundamentally changing what it takes to secure and maintain cyber insur...
βΆοΈ Listen Now
The Ingredient List: Surviving the Supply Chain Crisis of 2025
As software supply chain attacks double and regulators enforce stricter transparency, we break down how CISAβs 2025 guidance and Zero Trust principles are redefining corporate resilience against threa...
βΆοΈ Listen Now
The Perimeter is Dead: How Vendor Insecurity Ignited a $500 Million Ransomware Crisis
This episode exposes how systemic negligence and delayed disclosures by major firewall vendors have facilitated nation-state espionage and a healthcare ransomware catastrophe, proving that the hardwar...
βΆοΈ Listen Now