Navigating modern application security in a world of Cloud, DevSecOps and now AI is getting rather complex. We spoke to Idan Plotnik, who has 24 years of cybersecurity experience under his belt and is the Co-Founder of Apiiro about world of Application Security Posture Management (ASPM) and their relevance in both large and small organizations. Idan speaks about the challenges faced in managing vast quantities of repositories and tackles common misconceptions about ASPM, confirming that it's not intended to replace existing security pipelines.
Guest Socials: Idan Plotnik
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
Questions asked: (00:00) Introduction (04:58) A bit about Idan Plotnik (05:56) Application Security tools explained (08:09) Why Application Security Orchestration Correlation (ASOC) didn't work? (09:14) Difference between Cloud Security and Application Security Tools (14:51) Why is there a growing need for Application Security Tools today? (19:07) Do Small to Medium size businesses need Application Security Tools? (21:46) Managing Cybersecurity Tools (26:08) API Security for Applications (30:29) Dealing with Regulatory Requirements in Cybersecurity (34:16) Evolving Goals in Application Security (35:49) Deciphering MTTR in Cybersecurity (37:54) The Fun Questions (39:37) Where you can connect with Idan?
Why Least Privilege Matters in Cloud Security?
How is Kubernetes Network Security Evolving?
The Future of Software Development with AI
The role of Real Time Defense in Cloud Security
CISO's guide to embracing risk in business
Why Email Breaches Still Happen?
Essential Strategies to master Incident Response in Cloud
From Code Suggestions to Security
Cloud Security Operations for Modern Threats
Understanding Threat Modeling in Cloud
Balancing Efficiency & Security: AI’s Transformation of Legal Data Analysis
Sidecar Container Vulnerability in Kubernetes explained
Cybersecurity Best Practices and Password Security in Cloud and AI
Multicloud strategy for AWS and GCP
AI's Role in Security Efficiency - Kubernetes Edition
Build an Effective AWS Cloud Security Program in 2024
Offensive Cloud Security Program for 2024
Understand Your Cloud Security Landscape to cut through the noise!
Kubernetes Security Trends 2024 | Software Supply Chain Security, Zero Trust and AI
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
A Prairie Home Companion: News from Lake Wobegon