The De-FUD Podcast
The De-FUD Podcast
  • Видео 33
  • Просмотров 2 226
Ofir Ehrlich & Gonen Stein, Co-Founders, Eon.io
Join Nancy Wang and Ashish Popli in this episode of the De-FUD Me Podcast as they discuss with Ofir Ehrlich and Gonen Stein, co-founders of Eon.io, the first cloud backup posture management platform. Dive into the innovative solutions Eon.io offers for automatic mapping, classification, and accessible backups in cloud environments. Learn about their journey from CloudEndure to Eon.io, tackling data protection in cloud-native infrastructures, and their unique approach to managing and securing cloud environments. Explore how Eon.io is transforming backups from a cumbersome manual process to an automated system with global searchability and compliance management, helping enterprises avoid po...
Просмотров: 109

Видео

Data Protection & Cyber Resilience
Просмотров 3721 день назад
In this episode of the De-FUD Podcast, hosts Nancy Wang and Ashish Popli delve into the world of data protection and cyber resilience. Nancy, with her extensive background in data protection at Rubrik and AWS, offers her perspective on the historical evolution and current trends in the field. They cover various dimensions, including the transition from hardware to cloud-native solutions, the im...
David Goldschlag, Co-Founder & CEO, Aembit
Просмотров 68Месяц назад
In this episode of the De FUD Podcast, co-founder and CEO of Aembit, David Goldschlag, joins hosts Ashish Popli and Nancy Wang to discuss the innovative identity management solutions offered by Aembit. Starting in fall 2021, Aembit focuses on non-human identity management for DevOps and security teams, bridging gaps between various cloud services. David shares insights on his entrepreneurial jo...
Ofir Har-Chen, CEO & Co-Founder, Clutch Security
Просмотров 29Месяц назад
Ofir Har-Chen, Co-Founder and CEO of Clutch Security, joins the De FUD podcast to discuss the critical issue of non-human identity security in modern enterprises. Ofir shares his journey from UAV operator in the Israel Defense Forces to leading roles at Hunter's AI and Clutch Security. He explains the difference between human and non-human identities, the challenges posed by non-human identitie...
NHI Security
Просмотров 832 месяца назад
Nancy Wang and Ashish Popli dive deep into the complexities of non-human identities (NHIs) on this episode of the De-FUD Me Podcast. From understanding the NHI explosion in the cloud-native era to discussing real-world solutions and challenges, this conversation covers everything you need to know about managing and securing NHIs in modern enterprises. With insights from industry reports and per...
Timothy Yougblood, CISO, Astrix Security
Просмотров 612 месяца назад
Timothy Yougblood, CISO, Astrix Security
Aviv Mussinger, CEO, Kodem Security
Просмотров 1543 месяца назад
Aviv Mussinger, CEO, Kodem Security
Chris "Tito" Sestito, CEO & Co-Founder, HiddenLayer
Просмотров 1204 месяца назад
Chris "Tito" Sestito, CEO & Co-Founder, HiddenLayer
Lena Smart, CISO, MongoDB
Просмотров 598 месяцев назад
Lena Smart, CISO, MongoDB
The De-FUD.me Podcast Channel Trailer
Просмотров 599 месяцев назад
The De-FUD.me Podcast Channel Trailer
Dan Benjamin, Co-Founder & CEO, Dig Security
Просмотров 619 месяцев назад
Dan Benjamin, Co-Founder & CEO, Dig Security
Edge Computing and Security
Просмотров 209 месяцев назад
Edge Computing and Security
Cloud Security
Просмотров 369 месяцев назад
Cloud Security
Saurabh Shintre, Founder, Langsafe.ai
Просмотров 1339 месяцев назад
Saurabh Shintre, Founder, Langsafe.ai
Matan Getz, Founder & CEO, Aim Security
Просмотров 1969 месяцев назад
Matan Getz, Founder & CEO, Aim Security
Security for LLMs
Просмотров 1969 месяцев назад
Security for LLMs

Комментарии

  • @the-monthly-review
    @the-monthly-review 3 месяца назад

    Who are the left and right in this context?

    • @TheDe-FUDMePodcast
      @TheDe-FUDMePodcast 2 месяца назад

      In this context, “shifting left” means embedding “secure by default” practices early in the software development lifecycle (SDLC), specifically at the code and build stages, to address vulnerabilities before deployment. By contrast, “shifting right” focuses on runtime security, where operational safeguards in production environments ensure application traffic is secure and only authorized requests are processed. Kodem Security exemplifies a solution for effective shift-left adoption, enabling robust security integration without overwhelming teams with excessive signal noise from their codebases and interdependencies.

  • @the-monthly-review
    @the-monthly-review 3 месяца назад

    What attack vectors are we concerned about with commodity hardware?

    • @TheDe-FUDMePodcast
      @TheDe-FUDMePodcast 2 месяца назад

      Great question! Commodity hardware generally lacks advanced physical security measures, making it susceptible to attacks involving physical tampering, such as installing malicious hardware or altering components to exploit vulnerabilities and gain direct access. To secure against these risks, implementing hardware security modules (HSMs) or requiring hardware-based encryption keys for access is recommended. HSMs provide a secure physical environment for cryptographic operations, isolating and protecting sensitive keys from physical attacks. Hardware-based encryption controls, such as TPM (Trusted Platform Module) or Intel SGX (Software Guard Extensions), add an additional layer of security by safeguarding encryption keys and sensitive computations, which can mitigate risks related to unauthorized access or data exfiltration.