Couverture de SecOops Cybersecurity Podcast

SecOops Cybersecurity Podcast

SecOops Cybersecurity Podcast

De : Ben Moiz and Sneh
Écouter gratuitement

À propos de ce contenu audio

Join Ben, Moiz, and Sneh as they explore the ever-evolving world of cybersecurity. From phishing scams and hacking stories to emerging threats and defense strategies, they break down complex topics into relatable conversations. Whether you’re a tech pro or just cyber-curious, tune in to learn, laugh, and stay ahead of the latest in security—because in cybersecurity, there’s always an “oops” to uncover.Ben, Moiz and Sneh
Épisodes
  • Deep Dive Series – Episode 6 – Data Loss Prevention & Privacy Engineering: From Design to Operations
    Mar 1 2026

    🎙️ Episode: Data Loss Prevention and Privacy Engineering – From Design to Operations

    In this episode of the Deep Dive Series by Sec Oops, powered by Cyber View Point, we move beyond the legal "fine print" to explore Privacy as a core Engineering Discipline.

    We explore why "Legacy DLP" is failing in the modern cloud and introduce the concept of Data Lineage — the ability to track the story of your data from the moment it’s created. The team breaks down the three technical pillars of privacy: Predictability, Manageability, and Disassociability, explaining how they form the foundation of any dependable system.

    We also get into the "math of privacy," discussing the limitations of traditional anonymization and the rise of Differential Privacy and Federated Learning. Finally, we look at the Engineer’s Runbook: practical strategies for automating DSARs and data deletion across complex, distributed architectures.

    👉 Tune in to learn how to bridge the gap between "Privacy Policy" and "Privacy Code," ensuring your systems are built for both security and trust.

    Afficher plus Afficher moins
    29 min
  • Deep Dive Series – Episode 5 – Container and Kubernetes Security: Securing DevOps Environments
    Feb 1 2026

    🎙️ Episode: Container and Kubernetes Security – Securing DevOps Environments


    In this episode of the Deep Dive Series by Sec Oops, powered by Cyber View Point, hosts Ben, Moiz, and Sneh strip away the abstraction layers to expose the engine room of modern infrastructure: Containers and Kubernetes.


    We debunk the myth of the "secure sandbox" by breaking down the Linux primitives — Namespaces and Cgroups — that actually power containers, revealing why "root in a container is root on the host." This episode dissects the 4C's of Cloud Native Security (Cloud, Cluster, Container, and Code), providing a comprehensive strategy for hardening the Kubernetes API server and killing the dangerous "cluster-admin" default mindset.


    You’ll also hear insights on securing the software supply chain, solving the "garbage in, garbage out" problem by implementing image scanning and signing within your CI/CD pipelines. We explore the cultural shift of DevSecOps and how to bridge the gap between speed and security.


    👉 Tune in to learn how to architect a defense-in-depth strategy for K8s, from implementing Network Policies and RBAC to detecting runtime threats—ensuring your orchestrator is as resilient as the applications it runs.

    Afficher plus Afficher moins
    38 min
  • Deep Dive Series – Episode 4 – Cloud Security Maturity: Designing Security Across AWS, Azure, and GCP
    Jan 1 2026

    🎙️ Episode: Cloud Security Maturity – Designing Security Across AWS, Azure, and GCP


    In this episode of the Deep Dive Series by Sec Oops, powered by Cyber View Point, hosts Ben, Moiz, and Sneh tackle the complexity of building a mature, unified security program in the multi-cloud era. We move beyond basic configurations to focus on secure design and deployment across major providers like AWS, Azure, and GCP.


    We dissect the critical nuances of the Shared Responsibility Model across IaaS, PaaS, and SaaS, emphasizing where the customer's risk truly lies. The episode dives deep into the pillars of a mature architecture: establishing Identity as the new perimeter (Least Privilege across all clouds), securing data with robust Key Management, and implementing vendor-agnostic network segmentation.


    👉 Tune in to learn how to operationalize security with DevSecOps and Infrastructure as Code (IaC), and how to build a unified governance framework that ensures compliance and effective Incident Response in your dynamic, multi-cloud environment.

    Afficher plus Afficher moins
    45 min
Aucun commentaire pour le moment