Featured Videos
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/66a0e4c5807d660089d8ed8f_S05E25%20-%20Lily%20Chau.png)
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64a53ccfdfd01f28003ecb44_1.png)
![](https://assets-global.website-files.com/649af53c3a8569829264eed4/64be437dd906a158084a7918_csp-podcast-layer.png)
Fixing Cloud Security with AWS Lambda
Jul 23, 2024
•
Roku
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/66a0e43d53245549cc45d354_S05E24%20-%20Zvonko%20Kaiser.png)
![](https://assets-global.website-files.com/649af53c3a8569829264eed4/64be437dd906a158084a7918_csp-podcast-layer.png)
What is confidential computing? Explained for 2024
Jul 16, 2024
•
Nvidia
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/66a0e26808ccfc4c07336f3f_S05%20Idan%20Plotnik%20RSA.png)
![](https://assets-global.website-files.com/649af53c3a8569829264eed4/64be437dd906a158084a7918_csp-podcast-layer.png)
The role of Application Security in 2024
Jul 12, 2024
•
Apiiro
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/66a0e1af75ce53040ac55bbc_S05E23%20-%20Armon%20Dadgar.png)
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64be3e004c491c171cf84df0_4.png)
![](https://assets-global.website-files.com/649af53c3a8569829264eed4/64be437dd906a158084a7918_csp-podcast-layer.png)
The Evolution of Infrastructure as Code so far - 2024 Edition
Jul 9, 2024
•
HashiCorp
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/6686e8b2be4d0ce9e772090e_S05E22%20-%20Dan%20Benjamin.png)
![](https://assets-global.website-files.com/649af53c3a8569829264eed4/64be437dd906a158084a7918_csp-podcast-layer.png)
What is AI-SPM?
Jul 2, 2024
•
Palo Alto Networks
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/6686e813b34a549aa92185f6_S05%20Nabil%20Hannan.png)
![](https://assets-global.website-files.com/649af53c3a8569829264eed4/64be437dd906a158084a7918_csp-podcast-layer.png)
Proactive Security Strategies for AI Integration
Jul 1, 2024
•
NetSPI
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/6686e797fcbe55c10950835f_S05%20Brian%20McHenry.png)
![](https://assets-global.website-files.com/649af53c3a8569829264eed4/64be437dd906a158084a7918_csp-podcast-layer.png)
Why Identity and Edge Security Matters for Cloud Security?
Jun 28, 2024
•
Check Point
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/6686e70897bb294172c35274_S05E21%20-%20Dave%20Thompson.png)
![](https://assets-global.website-files.com/649af53c3a8569829264eed4/64be437dd906a158084a7918_csp-podcast-layer.png)
Creating Effective Sigma Rules with AI
Jun 25, 2024
•
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/6686e66d41e5caefd73be0fb_S05E20%20-%20Ely%20Kahn%20(1).png)
![](https://assets-global.website-files.com/649af53c3a8569829264eed4/64be437dd906a158084a7918_csp-podcast-layer.png)
What is the future of security operations with AI in 2024?
Jun 14, 2024
•
SentinelOne
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/666225329b59f016e89b0492_S05%20Kelsey%20Hightower.png)
![](https://assets-global.website-files.com/649af53c3a8569829264eed4/64be437dd906a158084a7918_csp-podcast-layer.png)
AI's Impact on Real-World Problems
Jun 5, 2024
•
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/66622367d18c7ddec7097aba_S05E19%20-%20Jimmy%20Mesta.png)
![](https://assets-global.website-files.com/649af53c3a8569829264eed4/64be437dd906a158084a7918_csp-podcast-layer.png)
Cloud Native Security Strategies for 2024
May 31, 2024
•
Rad Security
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/66573fe20b2acb779a2a9d54_S05%20David%20DeSanto.png)
![](https://assets-global.website-files.com/649af53c3a8569829264eed4/64be437dd906a158084a7918_csp-podcast-layer.png)
How can we improve developer security with AI in 2024?
May 28, 2024
•
GitLab