The Certified Cloud Security Professional (CCSP) Audio Course is your complete audio-first guide to mastering the world’s leading cloud security certification. Across dozens of structured episodes, we break down every CCSP exam domain, from cloud concepts and architecture to legal, risk, and compliance. Whether you are building foundational knowledge or sharpening advanced skills, this course helps you design, manage, and secure cloud environments with confidence. Learn at your own pace and ...
…
continue reading
Certified Professional Building Designer® Podcasts

1
Design Your Business | Empowering Creative Women Business Owners
Jen Taylor | Certified Director of Operations, Wedding Business Strategist, and Coach
Are you a wedding professional who feels burnt out? Do you want your wedding business to work for you instead of the other way around? Does the stress and frustration of running your wedding planning, design, or creative business ever make you want to throw in the towel, give up on your dream, and start working on your resumé? Stop right there! Host Jen Taylor understands how you feel and has answers for you. When she started out over 20 years ago as a successful destination wedding planner ...
…
continue reading
The Living While Leading Podcast is hosted by Sharon Ehrlich, an international coach who helps high-achieving professional women strategically build the lives and careers they desire. She firmly believes that we all have more power than we think to design our futures. This show offers practical guidance and inspiration to successful women who want to lead their lives with purpose and intention. Episodes cover topics such as overcoming imposter syndrome, strategies for career advancement, rea ...
…
continue reading
This is the podcast for women in pharmaceutical and medical device industry who want to excel in your career but without the stress and overwhelm so you can do more of what you want.. In each episode, veteran medical device sales professional, Certified Life Coach, and career mentor Michelle A. Bourque combines real-life experiences and cognitive tools to teach you how to continue to excel at your career, but without the stress and overwhelm, so you can do more of what you want. It's your ti ...
…
continue reading
Getting the Certified Professional Building Designer® (CPBD™) designation can be daunting. The second Tuesday of each month, join Steve Mickley, a long-time CPBD and chief staff officer at AIBD, as he interviews guests who have successfully completed their journeys to becoming a CPBD. If you're interested in becoming a building designer, want to earn your CPBD designation, or just want to hear some great career advice, this is the podcast for you.
…
continue reading
A top retirement podcast and longevity planning podcast. Dr. Dorian Mintzer, M.S.W., Ph.D., Board Certified Coach, and Certified Professional Retirement Coach, guides you on how to revolutionize all aspects of your retirement transition. This podcast will teach you how to retire with joy and confidence, ready to live the fullest in the second half of your life. In this podcast, Dr. Mintzer interviews a wide variety of experts in various areas of retirement and longevity planning, spanning th ...
…
continue reading
How do I have more balance in my life? How do I have more time for everything that matters? Am I ready to make a big change? How do I make more money? How can I have more energy? And the most common question is, Do I really have what it takes to reach my goals? Whether you are a business owner, a leader, a professional, the “boss” of the home and kids, or looking to jump into your next chapter, this is the show for you. The Dynamic Women® Podcast is an Award-Winning action-focused lifestyle ...
…
continue reading
Since 2006, we’ve broadcast unrehearsed and informative conversations featuring extraordinary career stories of ordinary people, and insights from future-of-work thought leaders including National Geographic explorer-in-residence Wade Davis, former Member of Parliament, Helene Leblanc, and career experts Sareena Hopkins, Norm Amundson, Roberta Borgen, Rich Feller and many more. We also look at the intersection of real-world business practice and people’s career and life choices. We explore h ...
…
continue reading
Gather around the table for insightful conversations focused on building heart-centered workplaces that thrive on equality, inclusive workplaces, and exceptional leadership. Betsy Cerulo (she/her) and her expert guests explore what it takes to transform workplace culture through thoughtful, meaningful dialogues that drive real social impact. Each engaging episode of Room at the Table Podcast gets to the core principles of creating a heart-centered workplace. Through inspiring conversations, ...
…
continue reading
Jamila Souffrant is a Certified Financial Education Instructor (CFEI), host of the Journey To Launch podcast and author of "Your Journey to Financial Freedom: A Step-By-Step Guide to Achieving Wealth and Happiness". The Journey To Launch podcast explores all aspects of reaching Financial Freedom; from increasing income, paying off debt, investing, saving & learning how to retire early and wealthy. The book, "Your Journey to Financial Freedom: A Step-By-Step Guide to Achieving Wealth and Happ ...
…
continue reading
A Podcast Designed to Bridge the Gap Between Macros, Metabolism, and Functional Medicine. Here we focus on translating complex concepts into leverage for your health, fitness, and nutrition goals with a special emphasis on content for coaches & health professionals. Sam Miller is a best-selling author in the field of nutrition and metabolism has more than 15 years of experience as a health, fitness, and nutrition coach. His programs help coaches and health professionals improve their clients ...
…
continue reading
Hosted by Jana Parker, a seasoned LEP with a wealth of experience in the field, this podcast is a vibrant community, a learning hub, and a source of encouragement for both aspiring and established educational psychologists. Meet Your Host: Jana Parker, MS, LEP, ABSNP, ADHD-CCSP: CEO of Mind by Design and Empower LEP, a Board Certified School Neuropsychologist and Certified ADHD Professional with a strong background in public education school psychology and administration as well as private p ...
…
continue reading
The Prosperity Podcast is for ambitious individuals—entrepreneurs and professionals—who want to take control of their finances and create a life of freedom, security and meaning. It’s for those who believe that wealth is about more than just money, it’s about having the freedom to choose how you live, work and give. Whether you’re just getting started or you’re looking to rebalance your approach, this podcast is your guide to building long term, sustainable wealth. We talk about investing wi ...
…
continue reading

1
Amazing Apps - learn how to build agile Dynamics 365 and Power Platform business apps using Scrum
Neil Benson
Amazing Apps is for Microsoft Dynamics 365 and Power Platform builders who want to use the Scrum framework to build amazing business apps that everyone will love. The podcast is hosted by Microsoft MVP, Neil Benson, and produced by Customery. [Dynamics365, D365, Power Apps, PowerApps, Power Pages, Power Apps Portals, Power Automate, Flow, Power Virtual Agents, PVA, PowerBI]
…
continue reading
Get ready to unleash your full potential and ignite your inner fire with the exhilarating "Time to Shine Today" podcast, hosted by Peak Performance Mindset Coach Scott Ferguson! Our mission is simple yet powerful: we refuse to let anyone feel alone or unsupported. Brace yourself for a game-changing experience that will elevate your life to new heights! Are you tired of the monotonous routine, longing for something greater? Don't despair! We've been there too, and we understand exactly how yo ...
…
continue reading

1
Episode 444: What a Slow Summer Taught Me About Money & Life
33:03
33:03
Play later
Play later
Lists
Like
Liked
33:03Hey Journeyers! I’m back on the mic after taking the summer off. In this solo episode, I’m reflecting on what it means to truly live financial freedom, not just chase it. Over the last few months, I’ve stepped back from hustle mode to embrace rest, family time, and the flexible lifestyle I’ve worked so hard to create. I’m sharing candid updates abo…
…
continue reading

1
The Danger of Busyness with Diane Rolston (DW330)
21:46
21:46
Play later
Play later
Lists
Like
Liked
21:46September can feel like a fresh start, but that is until your calendar is jammed and your energy is drained. In this episode, you'll discover the dangers of sliding into busyness so that you don't fall victim to the trap of overloading your schedule. Our host, Diane Rolston, discusses why having a busy calendar does not equal your worth and how to …
…
continue reading

1
S 838: 4 Traits of Successful Coaches That Most Get Backwards
25:00
25:00
Play later
Play later
Lists
Like
Liked
25:00After spending nearly 2 decades in this industry being mentored by some of the greats and observing thousands more, I've noticed some common patterns and trends among them. What I see newer coaches do is get these 4 traits I'm about to share with you backwards and I don't want you to be one of them. In today's episode, I'll share the 4 traits, why …
…
continue reading

1
The Podcast is Back: Designing a Wedding Business That Works for You
11:20
11:20
Play later
Play later
Lists
Like
Liked
11:20Have you ever wondered if it’s really possible to build a wedding business that fuels your freedom instead of draining your energy? In this episode, I’m sharing why I’ve returned to the mic and what you can expect as we relaunch Design Your Wedding Business. I open up about my journey from luxury wedding planner to certified operational expert, and…
…
continue reading

1
Human Design in Relationships with Linda Landon
43:49
43:49
Play later
Play later
Lists
Like
Liked
43:49In this enlightening episode of "Room at the Table," host Betsy Cerulo welcomes Linda Landon, a master coach and human design specialist, to explore the transformative power of human design in personal and professional settings. Linda unpacks the intricacies of this energetic assessment tool, revealing how it synthesizes ancient wisdom with modern …
…
continue reading

1
S 837: Using Science to Enroll More Clients, Build Credibility, and Grow Your Business without Feeling Salesy
27:36
27:36
Play later
Play later
Lists
Like
Liked
27:36After a decade plus in this industry and coaching hundreds of coaches to this point, there's a correlation between coaching and sales that can't be denied. I want to share with you 5 ways that your coaching and the belief and conviction you have in yourself affect your sales and client acquisition. Topics include: - Coaching and Sales - Selling You…
…
continue reading

1
Permission to Heal: Reclaiming Your Health & Inner Wisdom with Jessica Arias | Ep 348
38:32
38:32
Play later
Play later
Lists
Like
Liked
38:32In this week’s episode of It’s Your Time, Certified Life Coach Michelle Arnold Bourque welcomes Jessica Arias, a board-certified functional practitioner and soulful women’s health guide, for a rich conversation on healing, balance, and the power of permission. Jessica shares how she helps women move from burnout and disconnection to clarity and who…
…
continue reading

1
Episode 443: Work Less & Live More: How To Retire Often & Take Breaks with Jillian Johnsrud
49:56
49:56
Play later
Play later
Lists
Like
Liked
49:56This week on the Journey to Launch podcast, I’m welcoming back Jillian Johnsrud, author of Retire Often, to share how you can intentionally step away from work every few years, giving yourself the space to recharge, explore new possibilities, and create meaningful memories. Jillian has taken more than a dozen “mini retirements,” allowing her to liv…
…
continue reading

1
S 836: Caffeine and Sleep Quality: Research Review on Optimizing Intake for Your Metabolism and Genetics
18:41
18:41
Play later
Play later
Lists
Like
Liked
18:41A new study that came out in 2023 has some interesting observations when it comes to caffeine and sleep quality I wanted to bring to your attention in today's episode. We will discuss the benefits of caffeine, why our under-recovered society relies on this substance, caffeine half lives and how grapefruit juice and alcohol can impact it, conclusion…
…
continue reading

1
Your Success Depends on Who You Spend Time With (DW329)
23:57
23:57
Play later
Play later
Lists
Like
Liked
23:57Have you ever been a part of a group and thought, "Oh, where are my people? This isn't the right fit," or you've had a glimpse into what it's like to be around the ideal people? Then you're going to want to listen to this episode because you'll discover how your success depends on who you spend time with. Our host, Diane Rolston, shares three conve…
…
continue reading

1
Episode 100 — Emerging Regulations: AI, Sovereignty and Sector Rules
33:36
33:36
Play later
Play later
Lists
Like
Liked
33:36The cloud landscape is constantly evolving, and regulations are racing to keep pace. This final episode explores emerging rules governing artificial intelligence, digital sovereignty, and sector-specific requirements in areas like healthcare, finance, and critical infrastructure. These developments will shape the future of cloud security practice, …
…
continue reading

1
Episode 99 — Records Management: Retention Schedules and Disposition
34:12
34:12
Play later
Play later
Lists
Like
Liked
34:12Records management defines how information is retained, archived, and ultimately disposed of. In this episode, we cover how cloud systems enforce retention schedules, integrate with compliance requirements, and apply defensible disposition when data is no longer required. Poor records management not only creates legal risk but also inflates costs a…
…
continue reading

1
Episode 98 — Intellectual Property: Licensing, OSS Use and Patents in Cloud
35:25
35:25
Play later
Play later
Lists
Like
Liked
35:25Intellectual property concerns arise frequently in the cloud, where software, data, and designs may involve multiple stakeholders. This episode explores licensing models, use of open-source software (OSS), and patent issues that affect cloud adoption. We highlight why organizations must track licensing terms carefully and ensure OSS use complies wi…
…
continue reading

1
Episode 97 — Legal for BCDR: Force Majeure, RTO/RPO and Notifications
34:09
34:09
Play later
Play later
Lists
Like
Liked
34:09Business continuity and disaster recovery are not just technical exercises—they also carry legal obligations. This episode covers how contracts and laws address force majeure events, define Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO), and require notification to stakeholders when disruptions occur. These legal dimensions ensu…
…
continue reading

1
Episode 96 — Ethics & Professionalism: Codes, Conflicts and Duty of Care
34:35
34:35
Play later
Play later
Lists
Like
Liked
34:35Professionalism in cloud security goes beyond technical competence—it includes ethical conduct and adherence to codes of practice. This episode explains the ethical responsibilities of CCSP professionals, including conflict of interest management, duty of care, and adherence to industry codes such as the ISC2 Code of Ethics. We emphasize why trust,…
…
continue reading

1
Episode 95 — Cloud Insurance: Coverage, Exclusions and Incident Costs
34:50
34:50
Play later
Play later
Lists
Like
Liked
34:50Cyber insurance has expanded into cloud-specific policies, offering organizations financial protection against breaches, outages, and other incidents. This episode explores how cloud insurance is structured, including what is typically covered, common exclusions, and how claims are assessed. We discuss why organizations must carefully review polici…
…
continue reading

1
Episode 94 — Audit Readiness: Evidence Generation and Control Mapping
36:22
36:22
Play later
Play later
Lists
Like
Liked
36:22Audits test whether organizations can prove compliance with standards and contractual obligations. In this episode, we discuss audit readiness in the cloud, focusing on evidence generation, control mapping, and continuous assurance. Documentation, automated reporting, and mapping provider controls to customer responsibilities all play vital roles i…
…
continue reading

1
Episode 93 — Third-Party Risk: Due Diligence and Continuous Monitoring
35:35
35:35
Play later
Play later
Lists
Like
Liked
35:35Cloud adoption almost always involves third parties, and their risk becomes your risk. This episode explains how due diligence, contract clauses, and continuous monitoring are used to manage vendor relationships. We cover the importance of evaluating a provider’s certifications, financial stability, and security practices before onboarding, and why…
…
continue reading

1
Episode 92 — Digital Evidence: Logging, Time Sync and Admissibility
36:41
36:41
Play later
Play later
Lists
Like
Liked
36:41For evidence to be admissible in legal or regulatory contexts, it must be accurate, verifiable, and properly maintained. This episode explores how digital evidence is collected in cloud environments, focusing on logging, time synchronization, and data integrity. Logs must be complete, tamper-resistant, and tied to reliable time sources so investiga…
…
continue reading

1
Episode 91 — E-Discovery: Preservation, Collection and Production in Cloud
36:11
36:11
Play later
Play later
Lists
Like
Liked
36:11E-Discovery obligations do not disappear in the cloud; in fact, they often become more complex. This episode explains how organizations must preserve relevant data during litigation, ensuring it cannot be altered or deleted once a legal hold is in place. We discuss the challenges of collection across distributed services, including multiple regions…
…
continue reading

1
Episode 90 — Privacy Regulations: Cross-Border Transfers and Consent
37:20
37:20
Play later
Play later
Lists
Like
Liked
37:20Privacy regulations impose strict rules on how personal data is handled, especially in the cloud where cross-border transfers are routine. This episode explores the requirements for lawful transfers under frameworks such as GDPR, as well as consent obligations that ensure users’ rights are respected. We also discuss localization laws that may restr…
…
continue reading

1
Episode 89 — Compliance Frameworks: ISO, SOC and Cloud-Specific Standards
37:43
37:43
Play later
Play later
Lists
Like
Liked
37:43Compliance frameworks provide benchmarks for cloud providers and customers alike. In this episode, we cover widely adopted standards such as ISO 27001, SOC 2, and cloud-specific programs like CSA STAR. We explain how frameworks provide assurance to regulators, customers, and partners, while also reducing duplication of effort through recognized cer…
…
continue reading

1
Episode 88 — Governance & Risk: ERM, Risk Appetite and Cloud Policies
35:36
35:36
Play later
Play later
Lists
Like
Liked
35:36Governance provides the structure for aligning cloud security with business strategy. This episode explains how enterprise risk management (ERM) frameworks define risk appetite, set tolerance levels, and establish policies that guide cloud decisions. We examine how risk assessments inform governance structures and how policies translate high-level …
…
continue reading

1
Episode 87 — Contracts & SLAs: Security, Privacy and Audit Clauses
36:15
36:15
Play later
Play later
Lists
Like
Liked
36:15Contracts and service-level agreements (SLAs) form the legal foundation of cloud relationships. This episode explores how security, privacy, and audit clauses define accountability between providers and customers. We highlight the importance of specifying uptime commitments, incident response expectations, and audit rights to ensure transparency an…
…
continue reading

1
Episode 86 — Domain 6 Overview: Legal, Risk and Compliance
36:33
36:33
Play later
Play later
Lists
Like
Liked
36:33The sixth domain of the CCSP exam shifts attention from technical controls to the legal, risk, and compliance frameworks that govern cloud operations. In this episode, we introduce the core themes, including contracts, service-level agreements, international privacy rules, and regulatory obligations. While technical knowledge is essential, professi…
…
continue reading

1
Episode 85 — Service Catalog: Standard Builds and Self-Service Controls
35:18
35:18
Play later
Play later
Lists
Like
Liked
35:18A service catalog provides pre-approved templates and builds that standardize cloud deployment. In this episode, we discuss how catalogs simplify operations, reduce risk, and accelerate adoption by giving users secure, vetted options. Self-service access is controlled through catalog entries, ensuring that only compliant resources can be launched w…
…
continue reading

1
Episode 84 — Cost & Security: Guardrails for Spend with Least Privilege
36:38
36:38
Play later
Play later
Lists
Like
Liked
36:38Cloud introduces new financial dimensions to security. This episode explores how cost optimization intersects with security, showing how excessive privileges or poorly controlled resources can drive unexpected expenses and risks. We explain how budgets, quotas, and automated guardrails ensure both financial discipline and security hygiene. Cost gov…
…
continue reading

1
Episode 83 — Business Continuity: Failover, Runbooks and Exercises
34:43
34:43
Play later
Play later
Lists
Like
Liked
34:43Business continuity in the cloud goes beyond disaster recovery; it ensures that critical services remain available under any condition. In this episode, we cover failover strategies across regions, the creation of detailed runbooks that guide recovery actions, and the role of exercises in validating readiness. Continuity planning in the cloud benef…
…
continue reading

1
Episode 82 — Access Reviews: Just-In-Time and Just-Enough Access Workflows
33:48
33:48
Play later
Play later
Lists
Like
Liked
33:48Access control is only effective if it remains accurate over time. This episode explains how access reviews confirm that permissions align with roles and responsibilities, ensuring least privilege is preserved. We highlight advanced workflows such as Just-In-Time (JIT) access, which grants temporary credentials, and Just-Enough Access (JEA), which …
…
continue reading

1
Episode 81 — Key & Secret Operations: Rotation, Expiry and Escrow
27:57
27:57
Play later
Play later
Lists
Like
Liked
27:57Keys and secrets are not static assets; they must be actively managed to maintain security. In this episode, we explore operational practices such as regular rotation, enforced expiry, and escrow arrangements that ensure continuity in case of emergencies. Keys left unrotated for years become predictable targets, while secrets without expiration can…
…
continue reading

1
Episode 80 — Vulnerability Operations: Prioritization and Remediation at Scale
28:32
28:32
Play later
Play later
Lists
Like
Liked
28:32Vulnerability operations extend beyond scanning, focusing on how findings are prioritized, tracked, and remediated across thousands of resources. This episode covers how risk-based prioritization ensures that critical flaws are addressed first, while less urgent issues are scheduled for later remediation. We also explore automation and orchestratio…
…
continue reading

1
Episode 79 — Configuration Management: Baselines and Continuous Compliance
28:07
28:07
Play later
Play later
Lists
Like
Liked
28:07Configuration management goes hand in hand with posture and change management, ensuring systems remain aligned with secure baselines. This episode discusses how baselines are established, how continuous compliance tools monitor against them, and how automated remediation closes gaps quickly. In the cloud, where drift happens rapidly, configuration …
…
continue reading

1
Episode 78 — Change Management: Guardrails, Approvals and Exceptions
27:41
27:41
Play later
Play later
Lists
Like
Liked
27:41Change management ensures that updates to cloud environments are controlled, predictable, and secure. In this episode, we explore how guardrails, approval workflows, and documented exceptions keep systems stable while still allowing agility. We highlight the tension between speed and control, showing how automation can reduce friction while preserv…
…
continue reading

1
Episode 77 — Forensics in Cloud: Acquisition, Chain of Custody and Tools
29:04
29:04
Play later
Play later
Lists
Like
Liked
29:04Forensics in the cloud is complicated by lack of physical access, but it remains essential for investigations. This episode examines how evidence is acquired from cloud platforms, how chain of custody is maintained, and which tools support forensic readiness. We emphasize that evidence must be gathered in a way that preserves integrity, even when d…
…
continue reading

1
Episode 76 — Incident Response: Cloud-Specific Triage and Containment
22:04
22:04
Play later
Play later
Lists
Like
Liked
22:04Incident response in the cloud requires adapting traditional processes to dynamic, distributed environments. This episode covers how cloud-specific triage differs from on-premises, emphasizing challenges like volatile workloads, shared infrastructure, and rapid scaling. We discuss containment techniques that isolate affected services while minimizi…
…
continue reading

1
Episode 75 — SOAR Playbooks: Automation for Detection and Response
33:25
33:25
Play later
Play later
Lists
Like
Liked
33:25Security Orchestration, Automation, and Response (SOAR) platforms transform operations by codifying response actions into playbooks. This episode explains how triggers from SIEMs or monitoring systems activate playbooks that execute repeatable, automated workflows. By reducing manual effort, SOAR accelerates response and ensures consistency across …
…
continue reading

1
Episode 74 — Cloud Posture Management: Misconfiguration Detection and Drift
21:54
21:54
Play later
Play later
Lists
Like
Liked
21:54Cloud Security Posture Management (CSPM) addresses one of the leading causes of breaches: misconfiguration. In this episode, we explore how CSPM tools automatically detect weaknesses, enforce baselines, and identify drift from secure configurations. Cloud environments evolve rapidly, and without posture management, small errors can scale into criti…
…
continue reading

1
Episode 73 — SIEM & Analytics: Ingesting and Correlating Cloud Telemetry
21:02
21:02
Play later
Play later
Lists
Like
Liked
21:02Security Information and Event Management (SIEM) systems remain a cornerstone of security operations, but in the cloud, they must adapt to ingest vast amounts of telemetry from distributed sources. This episode explains how SIEM platforms collect, normalize, and correlate cloud logs, enabling advanced analytics that reveal patterns and anomalies ac…
…
continue reading

1
Episode 72 — Monitoring Strategies: Metrics, Logs and Traces in Cloud
22:56
22:56
Play later
Play later
Lists
Like
Liked
22:56Effective monitoring is at the heart of cloud security operations, providing the visibility required to detect, analyze, and respond to threats. In this episode, we discuss monitoring strategies that combine metrics for performance, logs for events, and traces for end-to-end transaction visibility. Each of these telemetry sources provides a differe…
…
continue reading

1
Episode 71 — Domain 5 Overview: Cloud Security Operations
24:18
24:18
Play later
Play later
Lists
Like
Liked
24:18Domain 5 introduces the operational side of cloud security, where the focus shifts from architecture and design to the day-to-day activities that ensure systems remain secure, resilient, and compliant. This episode provides a roadmap of the domain, highlighting monitoring strategies, posture management, automation, incident response, and business c…
…
continue reading

1
Episode 70 — Secure Delivery: Blue/Green, Canary and Rollback Safety
22:24
22:24
Play later
Play later
Lists
Like
Liked
22:24Delivery strategies determine how applications are released into production, and security must be considered at every step. In this episode, we compare blue/green deployments, canary releases, and rollback mechanisms, showing how each method reduces risk by limiting exposure to new code. These approaches provide safety nets when changes fail or int…
…
continue reading

1
Episode 69 — DevSecOps: Pipelines, Gates and Automated Policy
22:46
22:46
Play later
Play later
Lists
Like
Liked
22:46DevSecOps integrates security into every stage of the development and delivery process. This episode explains how pipelines enforce security gates, how automated policies validate code and infrastructure, and how feedback loops accelerate remediation. By embedding security in workflows, DevSecOps reduces friction and strengthens trust in deployment…
…
continue reading

1
Episode 68 — Configuration Management: Feature Flags and Secure Defaults
24:11
24:11
Play later
Play later
Lists
Like
Liked
24:11Configuration management ensures that applications run consistently and securely across environments. In this episode, we explore how feature flags, environment variables, and default settings play critical roles in security posture. Misconfigured defaults are a leading cause of breaches, making it vital to enforce secure baselines and monitor for …
…
continue reading

1
Episode 67 — Containerized Apps: Image, Registry and Runtime Controls
24:20
24:20
Play later
Play later
Lists
Like
Liked
24:20Containers bundle applications and dependencies, but their security depends on careful control across the lifecycle. This episode examines how images are built, stored in registries, and deployed in runtime environments. We highlight risks such as outdated base images, poisoned registries, and misconfigured container permissions. Hardening requires…
…
continue reading

1
Episode 66 — Serverless Apps: Event Injection and Least Privilege Design
22:58
22:58
Play later
Play later
Lists
Like
Liked
22:58Serverless applications offer scalability and efficiency but bring unique risks. In this episode, we explore how event-driven models introduce vulnerabilities such as event injection, where malformed inputs can manipulate logic or trigger unintended behavior. We also highlight the critical role of least privilege in securing serverless functions, e…
…
continue reading

1
Episode 65 — Runtime Protections: Behavior Monitoring and Application Shielding
23:38
23:38
Play later
Play later
Lists
Like
Liked
23:38Even well-tested applications face threats once deployed, making runtime protection essential. This episode covers technologies that monitor application behavior in real time, including runtime application self-protection (RASP), anomaly detection, and shielding mechanisms that block malicious inputs. These controls provide a last line of defense a…
…
continue reading

1
Episode 64 — Dynamic & Interactive Testing: DAST and IAST in CI/CD
24:58
24:58
Play later
Play later
Lists
Like
Liked
24:58Dynamic Application Security Testing (DAST) examines applications while they are running, simulating external attacks to uncover vulnerabilities that may not appear in source code. Interactive Application Security Testing (IAST) combines elements of both static and dynamic testing, instrumenting the application to monitor its behavior during execut…
…
continue reading

1
Episode 63 — Static Analysis: SAST Practices for Cloud Apps
24:34
24:34
Play later
Play later
Lists
Like
Liked
24:34Static Application Security Testing (SAST) analyzes source code or binaries to identify vulnerabilities before software is deployed. In this episode, we explain how SAST fits into cloud application development, integrating into CI/CD pipelines and enabling developers to catch errors early. Unlike dynamic testing, SAST does not require a running env…
…
continue reading