Navigating modern application security in a world of Cloud, DevSecOps and now AI is getting rather complex. We spoke to Idan Plotnik, who has 24 years of cybersecurity experience under his belt and is the Co-Founder of Apiiro about world of Application Security Posture Management (ASPM) and their relevance in both large and small organizations. Idan speaks about the challenges faced in managing vast quantities of repositories and tackles common misconceptions about ASPM, confirming that it's not intended to replace existing security pipelines.
Guest Socials: Idan Plotnik
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
Questions asked: (00:00) Introduction (04:58) A bit about Idan Plotnik (05:56) Application Security tools explained (08:09) Why Application Security Orchestration Correlation (ASOC) didn't work? (09:14) Difference between Cloud Security and Application Security Tools (14:51) Why is there a growing need for Application Security Tools today? (19:07) Do Small to Medium size businesses need Application Security Tools? (21:46) Managing Cybersecurity Tools (26:08) API Security for Applications (30:29) Dealing with Regulatory Requirements in Cybersecurity (34:16) Evolving Goals in Application Security (35:49) Deciphering MTTR in Cybersecurity (37:54) The Fun Questions (39:37) Where you can connect with Idan?
Understand Your Cloud Security Landscape to cut through the noise!
Kubernetes Security Trends 2024 | Software Supply Chain Security, Zero Trust and AI
Kubernetes Network Security for Multi Tenancy
AWS reInvent 2023 - Security highlights and announcements
eBPF - Kubernetes Network Security without the Blind Sides!
Attack Path Analysis for Better Kubernetes Security
Secure your SaaS applications like this!
Threat Detection for not so Common Cloud Services
How to Escape Clusters in a Managed Kubernetes Cluster?
Have I lost my Secrets?
How to become a Senior Cloud Security Engineer?
5 Skills to Level Up Your Cloud Hacking
Become a Cloud Native CISO in 2023
Software Supply Chain Controls for Terraform
Data Security RoadMap in 2023
The Cloud to Code Dilemma - Let's Talk
CISO Perspective: Josh Lemos, CISO of Gitlab
The Azure Cloud Security Pentesting Skills You NEED!
How to detect software supply chain attacks with Honeytokens?
Google Cloud Security Pentesting Methodology
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast