The Rise of Agentic Cloud Security: Code-to-Cloud Shrinks to 3 Days

View Show Notes and Transcript

Is your cloud security strategy ready for the "messy middle" of AI adoption? With developers pushing code from inception to production in under three days using "vibe coding," and adversaries capable of exfiltrating data in just 25 minutes, human-led security is no longer fast enough .In this episode, Ashish sits down with Elad Koren from Palo Alto Networks (Cortex Cloud) to discuss the shift toward Agentic Cloud Security. Elad spoke to us about why bolting an AI chatbot onto legacy security tools doesn't work, and why you must run AI directly where your data lies . Elad shared a real-world case study: an organization that rapidly spun up an "internal" AI workload to test the market, only to have a red team discover it was exposed to the public internet with zero authentication .If you want to know how the role of cloud security practitioners will evolve from manual analysts to AI orchestrators within the next five years, listen to this episode.

Questions asked:
00:00 Introduction
02:50 Who is Elad Koren? (Palo Alto Networks / RSA Security)
04:00 The Explosion of "Vibe Coding" and AI Applications
05:10 How CNAPP is Evolving from Posture to Active Protection
07:20 The New Threat Model: 25-Minute Exfiltration Windows
09:30 What is "Agentic Cloud Security"? (Fighting Machines with Machines)
11:40 The "Messy Middle" and the Evolution of Security Practitioners
14:30 Platformization: Why Security Can No Longer Survive in Silos
16:50 Blurring the Lines Between Cloud and Enterprise Estates
18:20 Case Study: An Unauthenticated "Internal" AI Workload Exposed
20:30 How AI is Shrinking Code-to-Cloud Cycles to 3 Days
22:30 The Coming Crisis: Security Token Budgets vs. Speed
23:30 Fun Questions: Kangaroo Jerky Tasting
25:20 Hobbies & Family: Cycling, Audiobooks, and Fatherhood
26:30 Favorite Food: Thai Cuisine in the Bay Area

Elad Koren: [00:00:00] Organizations are at that junction where they need to choose, am I doing that safely or am I doing that quickly? Because all of my competitors are running really fast. It can be seconds. Organization within 25 minutes can exfiltrate data. Yeah. You cannot wait for the practitioners to fix the gap.

Elad Koren: They're like water. They'll just find a path in. You close the door, they look at the window. You close a window. They look at the tunnel. If they don't have a tunnel, they'll dig a tunnel. That AI workload was open to the world without any need of authentication. The person creating that had little to almost no knowledge or awareness for security, somebody was able to access.

Elad Koren: He was able to exfiltrate data inception to production in less than three days, including testing, including everything. Wow. You cannot protect what you can see in about 12 to 18 months. That border of cloud and non-cloud will start to dissolve. Cloud is just one form of enterprise estate

Ashish Rajan: Agentic Cloud security, I'm sure you would've not heard that yet, [00:01:00] or at least many of you would not have.

Ashish Rajan: If you have been working in the cloud security space for a while, you probably understand how much AI has become part of your daily workload. It's in runtime. It's in the entire code to cloud lifecycle as we know it. But what you may not be aware how agentic workload is changing the requirement for the metrics that you collect.

Ashish Rajan: It's no longer enough that you have a cna. But having an understanding of the pathway API capabilities, and how you can have AI agents communicate with that as a platform will become the more important thing as we move into 2026 and beyond for a cloud security program. I had the pleasure of talking to Elad Koren, who is part of the Cortex Cloud team at Palo Alto Networks, and we spoke about everything that has evolved in cloud security from the time that we knew.

Ashish Rajan: A lot of us who are listening or watching this are probably as old as me in cloud security, probably spent decades into it. And how AI has changed it in the way we approach it, in the way we see it. All that and a lot more in this conversation with eld. As always, if you have a listening or watching episodes [00:02:00] of Cloud Security Podcast for a while and have been finding them valuable.

Ashish Rajan: I would really appreciate if you take a quick second to hit the subscribe, follow button, whichever podcast platform you listener watch on. We're on all podcast platforms including Apple, Spotify, YouTube, and LinkedIn. I hope you enjoy this conversation with Elad. Peace. Hello, I'm I,

Elad Koren: another episode

Ashish Rajan: of Cloud podcast.

Ashish Rajan: I've got Al with me. Hey man, thanks for coming on the show.

Elad Koren: Oh yeah, thanks you. Thanks for having me. It's great to be here again.

Ashish Rajan: I appreciate you coming back and maybe to give some intro to people about your background. What have you been doing in cybersecurity? Could you share a bit about yourself?

Elad Koren: Yeah, of course.

Elad Koren: So I've been in, uh, cybersecurity for more than two decades now. I've been in, uh, areas around malwares and, um, back in the days in RSA security, I've, I've done a few, uh, a few interesting things also related to online banking and, and securing online transactions. In the last decade or so, I was very close to cloud API, security and web applications.

Elad Koren: And the last three years I've been here in Peloton Networks and I've been, uh, working very closely with, uh, many other professionals [00:03:00] on the cloud business and, and anything we do on cloud solutions, it's very exciting. Really, it's a fast evolving along with the recent AI developments. I think it's one of the most interesting areas in security these days.

Ashish Rajan: I feel like you've hit a good topic right there itself, because in the past three years since AI kind of exploded on our screens, or at least on our phones in this case how have you seen the change happen in cloud, specifically cloud security? Like what? What's changed?

Elad Koren: Wow. We are seeing the evolution on steroids.

Elad Koren: Right. If you, if you look back just a few years, just three years or so, you started seeing AI as a standalone chat bot you talk to and provide you with more information.

Ashish Rajan: Yeah.

Elad Koren: But in the last year, the evolution and the, the evolving solutions on security and vibe coding and the things that we've seen.

Elad Koren: Exploded.

Elad Koren: You started seeing so many usage or different use cases of [00:04:00] AI apps and what they can do. And right now, more and more organizations understand that they need to move fast. Right. They're adding ai. Yeah. Our solution is our solution plus AI now. Yeah. Yeah. And you see that across the board.

Elad Koren: That means that organizations, just like with Cloud probably a decade ago, are at that junction where they need to choose, am I doing that safely?

Ashish Rajan: Yeah.

Elad Koren: Or am I doing that quickly because all of my competitors are running really fast, I need to run fast as well.

Ashish Rajan: Yeah. Yeah.

Elad Koren: And we are seeing that, and this affects security and how security is done very significantly.

Ashish Rajan: So is the conversation of CNAPP different now then? Because we obviously focus a lot of energy on the whole CSPM CNAPP. It feels like it was almost decades of it, but I'm sure it was only a few years of it. Now with ai, does that conversation need to be evolving as well? Or what? What's happened over there with CNAPPs?

Elad Koren: So it's an interesting, it's an interesting transformation throughout the years because if you asked cloud practitioners about five years ago,

Ashish Rajan: yeah,

Elad Koren: [00:05:00] they'll tell you hygiene posture, take care of that. Yeah, you're good. Like everything is fine. About three years ago, we started seeing the shift where cloud discussion shifted slightly towards, let's protect the cloud, let's add the right protection that CNAPP solutions can not only help you build better posture in cloud, but help you protect the cloud to an extent.

Elad Koren: Right. Yeah. And you started seeing the SOC. Being more and more involved in things related to cloud. Up until that point, they would pick up the phone to DevOps or DevSecOps and say, Hey guys, do you know what's going on there? Because we under, we don't understand anything in cloud. Yeah, yeah. But the fast pace that we are seeing in the last couple of years means that CNAPP solutions and cloud solutions today involve AI infrastructure that runs in cloud.

Elad Koren: Because you have to have it in cloud, you will not buy GPUs, and not every company can start buying GPUs. Right. And cloud solutions, cloud service providers are adding so many capabilities on AI.

Ashish Rajan: Yeah.

Elad Koren: So this junction where AI and cloud meet and [00:06:00] fast paced delivery right time to production

Ashish Rajan: Yeah.

Elad Koren: Requires CNAPP solutions today, and we see that we, you know, every customer that we talk to, they're saying, you're right.

Elad Koren: Cloud needs protection more than ever.

Ashish Rajan: Yeah,

Elad Koren: right. We cannot afford just to have posture because tomorrow something new can come and we will not have time to remediate that we, we will not have time to completely fix it. We need to be protected along the way and you hear more and more of that.

Ashish Rajan: So for people who are probably having conversations about uplifting a security program, we are in the beginning of the year having this conversation in San Francisco Cyber Week and the.

Ashish Rajan: Interesting part here for a lot of people would be, they may already have a cloud security. I would say a solution, but at least in a thinking behind, I understand cloud security coverage. Yeah. Yeah. I think I would cover they have some

Elad Koren: level of

Ashish Rajan: coverage. Yeah. But are we saying that with AI now, what are some of the gaps?

Ashish Rajan: You've noticed that in the previous approach? Probably. Not assumed. 'cause I think the whole [00:07:00] idea is that the threat model is not the same anymore. So what's changed about the threat model? That people are able to take back to their board. Mm-hmm. And, uh, talk to their own executives about, Hey, this is how we should approach this.

Ashish Rajan: Now,

Elad Koren: sir, there are three fundamental things that changed in the model.

Ashish Rajan: Yeah.

Elad Koren: The first one. AI is there for the adversaries. Yeah, they can move much faster.

Ashish Rajan: Yeah.

Elad Koren: With a simple prompt, they can generate attacks, they can build an infrastructure, and that means that the pace is much faster. It's no longer like days until you can leverage a vulnerability discovered.

Elad Koren: It can be seconds. Our latest report shows that it can take like 25 minutes for organization to 25 minutes, 25 minutes. Organization, you know, is susceptible to a, to an attack that within 25 minutes can exfiltrate data. So this is one factor. Yeah. You cannot wait for the practitioners to fix the gap for the developers to do that.

Elad Koren: You don't have time. Second, developers are pushing code much faster with vibe coding.

Ashish Rajan: Yeah. You

Elad Koren: add more and more and more content. Mm-hmm. To your applications. Yeah. [00:08:00] The level of complexity, the things that we are seeing there just moves so fast. It's growing exponentially, which means that there's no human level of coverage in teams.

Elad Koren: In companies that can address all that. You have to have some level of machine-based access or, or analysis of what happens. Yeah. Plus the protection to make sure that even if something is pushed in,

Ashish Rajan: you

Elad Koren: have enough time to remediate that and to fix it. Yeah. So you can take your, I dunno, few days. To fix that because you're protected.

Elad Koren: Yeah. You have the right, solution that can defend. And the third thing is that we are seeing more and more AI applications Yeah. That run in the cloud, that not many organizations know how to analyze the posture of these applications. So we've, you don't have the right protection there. You have a gap mm-hmm.

Elad Koren: That not many people know how to close. Combine all three and you have a time bomb basically.

Ashish Rajan: So, so what's [00:09:00] the agentic version of cloud security then? Because I, I feel like that's the probably highlight of 2026, that it's no longer enough to be AI first. It, you almost have to be agentic. So what's the agentic cloud security version then?

Elad Koren: I think it all starts with the fact that you have access to all the data. You can see everything in one platform and you're not just bolting ai

Ashish Rajan: Yeah.

Elad Koren: On existing solutions and you know, combining a few solutions together and say, yeah, I have an a AI that can talk to all those solutions. You need to run your AI where your data lies.

Ashish Rajan: Yeah. Yeah.

Elad Koren: Because then you have the ability to react, to change things very quickly. The other thing is that a good solution prioritizes and focuses on making sure that your tier one analysts. You can take 85, 90% of the things that they would do, the regular fixes, automatically, you'll fix that. You'll have an AI infrastructure, AI agents that work for you.

Elad Koren: Yeah.

Ashish Rajan: Yeah. '

Elad Koren: cause then you're fighting machines with machines. Yeah. And not with humans.

Ashish Rajan: That's right.

Elad Koren: And the second thing [00:10:00] is that this AI based or agentic solution for c. Focuses on making sure that you're bridging the gap across the board in a way that helps the SOC analysts do their job better.

Ashish Rajan: Yeah.

Elad Koren: It helps the cloud practitioners understand where they need to focus beyond the simple things. Right. Yeah. I identify the, the more advanced types of, uh. Attack path, if you will. Yeah. Like that involve data, AI apps, identity, that is becoming more and more of the new perimeter, right? Yeah. Yeah. So that is the focus of the CNAPP of the future handling like automatically more of the simple stuff and pushing more and more of the, of, of the complex stuff to humans where human analysis is required.

Ashish Rajan: Do you find that even as security leaders or practitioners, cloud security people also have to evolve? Like it's not enough for I mean, obviously the. We are moving to a time where all organizations are pushing for AI adoption to be higher across the teams. Everyone's doing it, but on the other end, there's an [00:11:00] expectation for us to have an agentic first Cloud security.

Ashish Rajan: What's the, what's the marry up here that you see that, where do you see this kind of go in the next year or so? 'cause uh, well maybe, I was gonna say maybe plan for 2026, but is it possible to plan for security program for cloud where it helps you go beyond point 2026. And what would that look like?

Elad Koren: I think if organizations think right now of the right way to approach, they need to be ready for two, two phases.

Elad Koren: The first phase that's coming up, I personally call it the messy middle. Like, it's like it's messy. Yeah. And nobody knows exactly what will happen in the second phase, but it's clear that something will change.

Elad Koren: So this is the morphing time. Yeah. Where we're, yeah. A lot of the basics, like if you think about the, the kind of the industrialization process we are going through that now.

Ashish Rajan: Yeah.

Elad Koren: Jobs will be different in five, 10 years. Yeah. The job to be done in security. Will be fundamentally different. I think if you look five years into the [00:12:00] future, security practitioners will become orchestrators.

Elad Koren: They'll become architects and they'll have AI agents working for them.

Ashish Rajan: Yeah.

Elad Koren: You know, and, and, and what needs to happen until that point, you'll need the trust and you'll need the right infrastructure and you'll need the right data. Yeah. So right now it's the building time and you're, you know, we're plowing through.

Elad Koren: So if somebody plans for that, they need to think about. How is the next year going to change the way their teams are working? Yeah. Experiment with AI. Learn more about how AI and agentic CNAPP can help them do things better.

Ashish Rajan: Yeah.

Elad Koren: Build that trust.

Ashish Rajan: Yeah.

Elad Koren: I think this is where 2026, 2027 is going to be focused at, and then later we will see how the exact number, size of teams today can do 10, 10 times more.

Elad Koren: Things can be much more efficient and can actually. Finally address all the security challenges that we see today teams cannot.

Ashish Rajan: So to your point, the whole level one kind of ecosystem is gonna slowly dissipate.

Elad Koren: [00:13:00] Yes.

Ashish Rajan: And for cloud security, and I guess. I love what he said earlier about if we have less than half an hour to get into a, be into the weeds of a problem before it gets exploited.

Ashish Rajan: I feel like what you also kind of hinted towards is that there we almost need all these other data points that traditionally would've been in other parts of the organization, like the, the is the silos ecosystem, not, I don't know, is what the right word is probably. Breaking down or is the right approach?

Elad Koren: We are deep into the platformization journey,

Ashish Rajan: right?

Elad Koren: And when we started this about two years ago, we were very early, but we saw how the future cannot be that bright future that we are looking at without bringing everything together. Yeah. Into one place. And that is, I think, the holy grail of security.

Elad Koren: When you have access to everything, when you don't need to connect different systems to collect different data from different places, this is where you can finally connect all the dots. So yes, I think, you know, this is a journey.

Ashish Rajan: Yeah.

Elad Koren: But [00:14:00] we are two years into that journey and we are, we're seeing the dividends yield by that.

Elad Koren: We are hearing our customers telling us, oh, great. Finally we can see everything in the same place. We can benefit from seeing those things play together.

Ashish Rajan: Yeah.

Elad Koren: So yes, I, I think, I think this is what we're starting to see when more and more customers and more and more organizations out there understand that.

Elad Koren: If they continue to build things in silos and to look at security as siloed different tasks by different practitioners.

Ashish Rajan: Yeah.

Elad Koren: Adversaries will prevail because they can find the gap. They're like water. They'll just find a path in. You close the door they look at the window. You close a window. They look at the tunnel.

Elad Koren: If they don't have a tunnel, they'll dig a tunnel. Right? Ah, yes. So you have to have visibility. You cannot protect what you can't see. That's right. Yeah. So you have to see everything so that you can protect everything.

Ashish Rajan: So. It is the ecosystem that we're moving towards for cloud security, where I am building AI [00:15:00] for security and so specifically cloud security.

Ashish Rajan: In that ecosystem, you see that traditionally what I may have just relied on, say multiple, I'm gonna talk to the AppSec person, I'm gonna talk to the, SOC person I'm gonna talk to, I dunno, inside another department, GRC department for my compliance pieces. All that's kind of coming together where you're almost seeing this happen where at least my hypothesis here is that the most organizations would build some kind of a harness internally with AI and then the ecosystem becomes where it should not matter because I just know what my internal context is, which I can't extend to a product company anyways.

Ashish Rajan: 'cause it's, that's my moat. I can't expose that.

Elad Koren: Correct.

Ashish Rajan: So I would need one place to go and get all the threat intel information about what my cloud environment looks like. Relying on the cloud provided security capability, do you still see that as a thing that would be enough for enterprises moving forward in this AI world that we are moving with?

Elad Koren: I think some will be able to get away [00:16:00] with that, but more organizations than not will find themselves in, um, in a situation where, think about it, cloud is just how it's not a thing of its own.

Ashish Rajan: Yeah.

Elad Koren: When it's part of your broader estate. So if you're just living in cloud, sure, just look at cloud.

Elad Koren: But if you have like probably 99% of organizations out there, workstations, servers running in areas that are private cloud or specific I dunno, IOT, things that, that go beyond just the pure cloud with regular CSPs, what you'd find is that in about probably, 12 to 18 months.

Ashish Rajan: Yeah.

Elad Koren: That border of cloud and non-cloud will start to dissolve and you'll start seeing that enterprise estate.

Elad Koren: Yeah. And cloud is just one form of enterprise estate, right?

Ashish Rajan: That's right.

Elad Koren: So if you are not looking at it holistically now, they will at some point they'll have to

Ashish Rajan: Yeah. Do you find the AI workloads that people are gonna build in cloud, that's gonna change because I'm, I'm also thinking about people who [00:17:00] are walking.

Ashish Rajan: Into this, into 2026 with an understanding for I, I need to uplift my cloud security program. What should they look at as a capability to what we've been talking about? 'cause most people don't wanna keep changing their product six months, seven months down the line. Right? It's more long term. What do you think should people focus on in that uplifting program?

Ashish Rajan: Obviously there could be many things, but any one or two things that come to mind where, hey, if you focus on these two or three things that. Would help you go beyond just 2026, 2027, 2028. It would last you the entire I don't know about the entire ai, but at least it's long enough that you feel comfortable enough.

Elad Koren: So it's, it's known to everyone that the chain is only as strong as the weakest link.

Ashish Rajan: Yeah. Yeah.

Elad Koren: And if you have the best AI coverage and the best AI infrastructure, but you're running on a poor cloud infrastructure and you're trying to be as quick as possible through production. Test things out there.

Ashish Rajan: Yeah.

Elad Koren: But you're not securing the infrastructure, you're [00:18:00] not securing the ability to access the data. You're not securing the identity. Yeah. That can access this AI or, or ai, a ai, uh, workload.

Ashish Rajan: Yeah.

Elad Koren: Then you're essentially opening it up. I'll answer with an example, and in this example you'll see what I think needs to be the top actions by organizations.

Elad Koren: I heard about a case I won't name names. I'll try and change some of the. Some of the details, so it's not recognizable, but on an organization that wanted to create an experimental AI app. Yeah. Running in their cloud to be as quickly as possible to market. And, uh, they created that.

Elad Koren: But eventually that AI workload that was designed for internal use

Ashish Rajan: Yeah.

Elad Koren: Was open to the world. Because of the infrastructure it was running on not the workload itself, because the infrastructure itself was open to the world. Yeah. And without any need of authentication. And you'd be surprised, right.

Elad Koren: Why would it happen? Yeah. But the answer is that the person creating that had little to almost no knowledge or awareness for security.

Ashish Rajan: [00:19:00] Yeah.

Elad Koren: And they basically said, yeah, it's internal, it's an internal machine. Nobody can access that. Theoretically, yeah. But then as they had a red team testing, somebody was able to access and get through to that AI infrastructure that was internal.

Elad Koren: So it meant it had access to internal data.

Ashish Rajan: Yeah.

Elad Koren: And he was able to exfiltrate data. Luckily it wasn't an a formal breach, but what happened if you think about that. You need to make sure that you have visibility into where your AI runs.

Ashish Rajan: Yeah,

Elad Koren: identities that can access.

Ashish Rajan: Yeah.

Elad Koren: And how you can secure those with the least privileged and minimal access to really restricted data.

Elad Koren: So I think if you boil everything down to what's needed, I think that is like

Ashish Rajan: visibility and identity being the two key big pieces. And I guess access control is another one. Do you find, obviously traditional workflow, and this is probably my last technical question as well. In the traditional workflow, we've primarily just relied on.

Ashish Rajan: Yeah, I, I'm, but I'm going with, this is code to cloud as a, the entire ecosystem of mm-hmm. Now that the volume of code has increased, there's more cloud [00:20:00] infrastructure being pre produced, has that evolved as well? Now, are we doing the whole, like is there, where, where are we taking this? I guess in terms of how different is code to cloud today than what we started pre AI, for lack of a better pre gen AI specifically before we started.

Elad Koren: I think it's very different. I think it's going to change a lot with vibe coding. We're seeing. The old processes of, PRD design documents, coding, pushing to test, and staging UAT production.

Ashish Rajan: Yeah.

Elad Koren: We're seeing a lot of these change.

Ashish Rajan: Yeah.

Elad Koren: As I don't know what some of our organizations that are watching us now experienced, but I personally am have talked to a few organizations that were like inception to production in less than three days.

Elad Koren: Including testing, including everything.

Ashish Rajan: Wow. Okay.

Elad Koren: So this puts this entire code to cloud under even bigger scrutiny because you don't have time. Like I, if until today we said, yeah, you can block some of the [00:21:00] deployments and you can just alert on the rest and, and just have that running in production and fix it later.

Elad Koren: It makes the importance of identifying issues as early as possible.

Ashish Rajan: Yeah,

Elad Koren: even more critical because. We all know you like the new and shiny thing and you move on to the next new and shiny thing.

Ashish Rajan: Yeah.

Elad Koren: So you push things into your production with a, like a simple vibe coding prompt, and you test it. True.

Elad Koren: But if you're not security, scrutinizing it throughout. You're ending up with and think about it, you'll have far more code

Ashish Rajan: Yeah.

Elad Koren: To review. You'll have far more production apps. Yeah. Cloud infrastructure. Yeah. The complexity, what proved to be, and throughout the years you saw the proof. When you have smarter, better solutions, you're not necessarily reducing the complexity.

Elad Koren: You're adding to the complexity. Yeah. So I think it, it highlights that. And I'll say one more thing on this one. Nobody's talking. I think some start talking about the cost.

Elad Koren: Yeah. Associated with that. So today it's like adopt everything. [00:22:00] Vibe code, everything. Just push AI wherever you can, but it's only a matter of time until you know somebody will come and say, great, we've went all the way to production, but now let's reduce the budget on tokens for the security review of that one because we need to move fast.

Elad Koren: Yeah. I need this to develop the next thing. Come on. It's only a matter of time until this happens, which is why it's important to bill it the right way from the get go, which just highlights why it's important.

Ashish Rajan: Yeah, I mean, well said, well said. So I've got fun questions, which is

Elad Koren: Oh, nice.

Ashish Rajan: But then to make it the fun questions, even more fun, I've got a snack.

Ashish Rajan: I'll let you know the secret as well. So far, the crowd favorite has been kangaroo and crocodile, so it's jerky, so it's, it's safe for eating, actually. Have you had an alligator or crocodile before?

Elad Koren: No.

Ashish Rajan: Or a kangaroo?

Elad Koren: No.

Ashish Rajan: Perfect. So I think, I mean, my recommendation would be,

Elad Koren: but so I, so I'll tell you this, I, I, I have I have a problem eating something that looks so cute.

Elad Koren: Ha. So,

Ashish Rajan: right. Okay.

Elad Koren: So, so I have a problem with the kangaroo, but I heard that it's actually a like a problem.

Ashish Rajan: It is back in, especially the [00:23:00] red, especially the red kangaroos are, they're like six feet tall and they attack you and all that as well okay. Yeah. So maybe let's assume this, let's assume this is a red kangaroo.

Elad Koren: Okay, great. Like, it's red.

Ashish Rajan: Yeah. Yeah, it's red packet. Uh, so

Elad Koren: let's try one.

Ashish Rajan: Would you wanna try kangaroo and crocodile? Why not? Why not? Okay. Fair. Uh, the live reaction for this. All right. First kangaroo jerky experience.

Ashish Rajan: Can, we can finish the packet, if you reckon, if you had the packet.

Elad Koren: Probably yes. With the right, with the right football game.

Ashish Rajan: Oh fair. What about, uh, let's try the crocodile then, I guess, as well, and figure out,

Elad Koren: I'll tell you what's better.

Ashish Rajan: Oh yeah, I'll, I'm curious, what do you think about crocodile is a general sentiment people have had since they tried crocodile?

Ashish Rajan: Is it like chicken? Maybe I'm guilty of just telling people what it tastes like. I should have just asked you.

Elad Koren: No, no, no. Well, yes. Yeah, you should. You shouldn't offer the offer the answer.

Ashish Rajan: I clouded your opinion before

Elad Koren: I, yeah, I can see why someone would say that. It tastes like chicken, but. Basically everything that [00:24:00] is pretty like neutral and not that dominant taste like chicken.

Elad Koren: So, yeah.

Ashish Rajan: Yeah.

Elad Koren: So I think this is it.

Ashish Rajan: Yeah. But would you say, I mean, obviously this is your first crocodile or first kangaroo as well, so I'm glad you are, you're, you're feeling le Are you leaning one, one or the other?

Elad Koren: Yeah. I think the kangaroo is better.

Ashish Rajan: Kangaroo is better. Oh, perfect. I mean, the expectation people normally has, like, it will be very gamey, but it's technically not.

Ashish Rajan: But anyway, three questions, three fun questions. First one, what do you spend most time on when you're not trying to solve cloud security problems of the world?

Elad Koren: I'm. Doing sports, running mostly and cycling.

Ashish Rajan: Oh, long distance.

Elad Koren: Yeah. Well, not as long as you'd expect. Probably like around, uh, eight to 10 miles ish.

Ashish Rajan: Yeah.

Elad Koren: Yeah. Riding like 20, 30, 40 miles.

Ashish Rajan: Wow.

Elad Koren: Cycling and, um, audio books. While doing that, I really love audiobooks, usually oh, action. And, uh, yeah. Very

Ashish Rajan: nice, nice. Second question, what is something that you're proud of that is not on your social media?

Elad Koren: Proud of that is not on my social media. My five-year-old, my your 5-year-old.

Elad Koren: My five-year-old daughter. Yeah. She's not on social media. I, I don't post any, any photos, nothing. [00:25:00] And probably like my three boys and, and then the girl. It's like the kids. Yeah. Yeah. I'm most proud of. I, I think being a father is like one of the best things. Ever.

Ashish Rajan: Awesome. Final question. What is a, what's your favorite cuisine or restaurant that you can recommend?

Elad Koren: Uh, lately we've been really into, uh, Thai food.

Ashish Rajan: Thai food. Okay.

Elad Koren: Yeah, yeah, yeah. There are a few really nice, really nice Thai, uh, restaurants here in the Bay Area.

Ashish Rajan: Yeah.

Elad Koren: And, um, yeah, we like the spicy and combination of like spicy, sweet type of, uh. Type of food. Nice. We love it.

Ashish Rajan: Awesome. And where can people learn more about what Palo Alto is working on, specifically in the Platformization Cloud Security Agentic First Cloud security.

Ashish Rajan: Where can we learn more about that?

Elad Koren: Yeah, they can go to our website, they can look at our, um, LinkedIn company page and, uh, specifically for Cortex, we have, have a lot of information available in our latest, uh, latest sessions in both in Symphony and here in, um, and this the biggest week of [00:26:00] cyber.

Ashish Rajan: Yeah.

Ashish Rajan: Yes.

Elad Koren: We've posed a lot of content with reference to where you can read more. Yeah. So yeah, a lot of information is out there.

Ashish Rajan: I'll put that in and uh, I'll put you a LinkedIn as well people and connect for you directly yourself. But thank you so much for coming on the show.

Elad Koren: Thank you. Thank you. Appreciate it.

Ashish Rajan: Thank you so much for

Elad Koren: joining as well.

Ashish Rajan: Thank you for listening or watching this episode of Cloud Security Podcast. This was brought to you by Tech riot.io. If you are enjoying episodes on cloud security, you can find more episodes like these on Cloud Security Podcast tv, our website, or on social media platforms like YouTube, LinkedIn, and Apple, Spotify.

Ashish Rajan: In case you are interested in learning about AI security as well. To check out our sister podcast called AI Security Podcast, which is available on YouTube, LinkedIn, Spotify, apple as well, where we talk. To other CISOs and practitioners about what's the latest in the world of AI security. Finally, if you're after a newsletter, it just gives you top news and insight from all the experts we talk to at Cloud Security Podcast.

Ashish Rajan: You can check that out on cloud security newsletter.com. I'll see you in the next episode,

please.

No items found.
More Videos