<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:podcast="https://podcastindex.org/namespace/1.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/"
    xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"
    xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:spotify="http://www.spotify.com/ns/rss">
    <channel>
        <title>SilverLining IL</title>
        <generator>Castos</generator>
        <atom:link href="https://feeds.castos.com/okr2" rel="self" type="application/rss+xml" />
        <link>https://silverlining-il.castos.com/</link>
        <description>The podcast for Security Architecture
Hosted by Moshe Ferber and Ariel Munafo.

The world of software development has changed rapidly in the last years due to various factors –   Cloud Computing, Digital Transformation, CI/CD &amp; DevOps – they all changed the way we build new applications. Young startups today got access to enterprise-grade infrastructure enabling them to produce scalable, robust applications faster and cheaper. But as companies innovate faster, security challenges arise. The security community has not mastered yet the full art of developing software fast, at scale, and secure and variety of companies still struggle to found the right foundation for their security posture.

SilverLining podcast was created to help you do just that – find the right combination of people, processes, and technologies to build more secure and reliable services. We will focus on the latest development in infrastructure and software development and talk with people who mastered how to secure those. In each episode, we will host an expert for discussion on the security aspects of new technologies and provide insights, best practices, and knowledge in creating more secure software architecture.</description>
        <lastBuildDate>Tue, 30 May 2023 03:05:00 +0000</lastBuildDate>
        <language>en</language>
        <copyright>© 2020</copyright>
        
        <spotify:limit recentCount="150" />
        
        <spotify:countryOfOrigin>
            IL US GB
        </spotify:countryOfOrigin>
                    <image>
                <url>https://episodes.castos.com/5e47c734855d97-04528563/images/SILVERLINIG1400-1400.jpg</url>
                <title>SilverLining IL</title>
                <link>https://silverlining-il.castos.com/</link>
            </image>
                <itunes:subtitle>The podcast for Security Architecture
Hosted by Moshe Ferber and Ariel Munafo.

The world of software development has changed rapidly in the last years due to various factors –   Cloud Computing, Digital Transformation, CI/CD &amp; DevOps – they all changed the way we build new applications. Young startups today got access to enterprise-grade infrastructure enabling them to produce scalable, robust applications faster and cheaper. But as companies innovate faster, security challenges arise. The security community has not mastered yet the full art of developing software fast, at scale, and secure and variety of companies still struggle to found the right foundation for their security posture.

SilverLining podcast was created to help you do just that – find the right combination of people, processes, and technologies to build more secure and reliable services. We will focus on the latest development in infrastructure and software development and talk with people who mastered how to secure those. In each episode, we will host an expert for discussion on the security aspects of new technologies and provide insights, best practices, and knowledge in creating more secure software architecture.</itunes:subtitle>
        <itunes:author>MarkeTech Group</itunes:author>
        <itunes:type>episodic</itunes:type>
        <itunes:summary>The podcast for Security Architecture
Hosted by Moshe Ferber and Ariel Munafo.

The world of software development has changed rapidly in the last years due to various factors –   Cloud Computing, Digital Transformation, CI/CD &amp; DevOps – they all changed the way we build new applications. Young startups today got access to enterprise-grade infrastructure enabling them to produce scalable, robust applications faster and cheaper. But as companies innovate faster, security challenges arise. The security community has not mastered yet the full art of developing software fast, at scale, and secure and variety of companies still struggle to found the right foundation for their security posture.

SilverLining podcast was created to help you do just that – find the right combination of people, processes, and technologies to build more secure and reliable services. We will focus on the latest development in infrastructure and software development and talk with people who mastered how to secure those. In each episode, we will host an expert for discussion on the security aspects of new technologies and provide insights, best practices, and knowledge in creating more secure software architecture.</itunes:summary>
        <itunes:owner>
            <itunes:name>MarkeTech Group</itunes:name>
            <itunes:email>ariel@israelclouds.com</itunes:email>
        </itunes:owner>
        <itunes:explicit>false</itunes:explicit>
                    <itunes:image href="https://episodes.castos.com/5e47c734855d97-04528563/images/SILVERLINIG1400-1400.jpg"></itunes:image>
        
                                    <itunes:category text="Technology" />
                                                <itunes:category text="News">
                                            <itunes:category text="Tech News" />
                                    </itunes:category>
                                                <itunes:category text="Education" />
                    
                    <itunes:new-feed-url>https://feeds.castos.com/okr2</itunes:new-feed-url>
                
        
        <podcast:locked>yes</podcast:locked>
                                    <item>
                <title>
                    <![CDATA[SilverLining Episode 59: Understanding the six pillars of DevSecops]]>
                </title>
                <pubDate>Tue, 30 May 2023 03:05:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/5725/episode/1487493</guid>
                                    <link>https://silverlining-il.castos.com/episodes/silverlining-episode-59-understanding-the-six-pillars-of-devsecops</link>
                                <description>
                                            <![CDATA[<p><strong>Guest: Sam Sehgal, Co-Chair for the CSA DevSecOps working group and program Lead - DevSecOps Strategy and Architecture, Dell</strong></p>
<p><strong>Language: English</strong></p>
<p> </p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">DevSecOps, the integration of security practices into the DevOps methodology, has become a prominent topic in the field of information security in recent years. This approach emphasizes the collaboration between development, operations, and security teams throughout the software development lifecycle. </span></p>
<p><span style="font-weight:400;">In this episode, we had the opportunity to speak with Sam Sehgal, co-chair for the DevSecOps Working Group (WG) at the Cloud Security Alliance (CSA). Sam shed light on the six pillars that form the foundation of the DevSecOps methodology and highlighted the vital role played by the WG in driving the integration of security practices within the realms of DevOps and cloud computing.</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Guest: Sam Sehgal, Co-Chair for the CSA DevSecOps working group and program Lead - DevSecOps Strategy and Architecture, Dell
Language: English
 
Abstract
DevSecOps, the integration of security practices into the DevOps methodology, has become a prominent topic in the field of information security in recent years. This approach emphasizes the collaboration between development, operations, and security teams throughout the software development lifecycle. 
In this episode, we had the opportunity to speak with Sam Sehgal, co-chair for the DevSecOps Working Group (WG) at the Cloud Security Alliance (CSA). Sam shed light on the six pillars that form the foundation of the DevSecOps methodology and highlighted the vital role played by the WG in driving the integration of security practices within the realms of DevOps and cloud computing.]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[SilverLining Episode 59: Understanding the six pillars of DevSecops]]>
                </itunes:title>
                                    <itunes:episode>59</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Guest: Sam Sehgal, Co-Chair for the CSA DevSecOps working group and program Lead - DevSecOps Strategy and Architecture, Dell</strong></p>
<p><strong>Language: English</strong></p>
<p> </p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">DevSecOps, the integration of security practices into the DevOps methodology, has become a prominent topic in the field of information security in recent years. This approach emphasizes the collaboration between development, operations, and security teams throughout the software development lifecycle. </span></p>
<p><span style="font-weight:400;">In this episode, we had the opportunity to speak with Sam Sehgal, co-chair for the DevSecOps Working Group (WG) at the Cloud Security Alliance (CSA). Sam shed light on the six pillars that form the foundation of the DevSecOps methodology and highlighted the vital role played by the WG in driving the integration of security practices within the realms of DevOps and cloud computing.</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/1487493/Silver-lining-59.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F5725%2Fepisode%2F1487493&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fsilverlining-episode-59-understanding-the-six-pillars-of-devsecops&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=660fdaf15c6a31cbe26d65d4945eec58ca239a884e92f3699cbba71d2e3e17dd" length="78451048"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Guest: Sam Sehgal, Co-Chair for the CSA DevSecOps working group and program Lead - DevSecOps Strategy and Architecture, Dell
Language: English
 
Abstract
DevSecOps, the integration of security practices into the DevOps methodology, has become a prominent topic in the field of information security in recent years. This approach emphasizes the collaboration between development, operations, and security teams throughout the software development lifecycle. 
In this episode, we had the opportunity to speak with Sam Sehgal, co-chair for the DevSecOps Working Group (WG) at the Cloud Security Alliance (CSA). Sam shed light on the six pillars that form the foundation of the DevSecOps methodology and highlighted the vital role played by the WG in driving the integration of security practices within the realms of DevOps and cloud computing.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/1487493/EP59.jpg"></itunes:image>
                                                                            <itunes:duration>00:32:40</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[SilverLining Episode 58: Quantum computing security challenges - CSA QSS working group]]>
                </title>
                <pubDate>Wed, 01 Mar 2023 06:00:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/5725/episode/1426278</guid>
                                    <link>https://silverlining-il.castos.com/episodes/silverlining-episode-58-quantum-computing-security-challenges-csa-qss-working-group</link>
                                <description>
                                            <![CDATA[<p><strong>Guest: </strong><strong>Ludovic Perret, Associate Professor at Sorbonne University &amp; Co-founder of CryptoNext Security and <a href="mailto:bruno.huttner@idquantique.com" target="_blank" rel="noreferrer noopener">Bruno Huttner</a> , Director of Quantum Strategic Initiatives at ID Quantique</strong></p>
<p><strong>Language: English</strong></p>
<p> </p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">The Quantum-safe security working group is a Cloud Security Alliance research wg that was created to promote awareness and education on the challenges of Quantum computing. In this episode we spoke to the working group leaders in order to better understand Quantum security challenges and how the security  community can overcome these challenges. </span></p>
<p><span style="font-weight:400;">This is the first episode in a series of episodes that will be dedicated to CSA research efforts and the working groups that produce the next generation best practices and researches.</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Guest: Ludovic Perret, Associate Professor at Sorbonne University & Co-founder of CryptoNext Security and Bruno Huttner , Director of Quantum Strategic Initiatives at ID Quantique
Language: English
 
Abstract
The Quantum-safe security working group is a Cloud Security Alliance research wg that was created to promote awareness and education on the challenges of Quantum computing. In this episode we spoke to the working group leaders in order to better understand Quantum security challenges and how the security  community can overcome these challenges. 
This is the first episode in a series of episodes that will be dedicated to CSA research efforts and the working groups that produce the next generation best practices and researches.]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[SilverLining Episode 58: Quantum computing security challenges - CSA QSS working group]]>
                </itunes:title>
                                    <itunes:episode>58</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Guest: </strong><strong>Ludovic Perret, Associate Professor at Sorbonne University &amp; Co-founder of CryptoNext Security and <a href="mailto:bruno.huttner@idquantique.com" target="_blank" rel="noreferrer noopener">Bruno Huttner</a> , Director of Quantum Strategic Initiatives at ID Quantique</strong></p>
<p><strong>Language: English</strong></p>
<p> </p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">The Quantum-safe security working group is a Cloud Security Alliance research wg that was created to promote awareness and education on the challenges of Quantum computing. In this episode we spoke to the working group leaders in order to better understand Quantum security challenges and how the security  community can overcome these challenges. </span></p>
<p><span style="font-weight:400;">This is the first episode in a series of episodes that will be dedicated to CSA research efforts and the working groups that produce the next generation best practices and researches.</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/1426278/EP58.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F5725%2Fepisode%2F1426278&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fsilverlining-episode-58-quantum-computing-security-challenges-csa-qss-working-group&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=28e29358bfc4465853c8572a4dfc74cebb83f31bd19ff61f08bf5bf06aae564f" length="26511489"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Guest: Ludovic Perret, Associate Professor at Sorbonne University & Co-founder of CryptoNext Security and Bruno Huttner , Director of Quantum Strategic Initiatives at ID Quantique
Language: English
 
Abstract
The Quantum-safe security working group is a Cloud Security Alliance research wg that was created to promote awareness and education on the challenges of Quantum computing. In this episode we spoke to the working group leaders in order to better understand Quantum security challenges and how the security  community can overcome these challenges. 
This is the first episode in a series of episodes that will be dedicated to CSA research efforts and the working groups that produce the next generation best practices and researches.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/1426278/EP-58.2.jpg"></itunes:image>
                                                                            <itunes:duration>00:31:33</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[SilverLining Episode 57: How CISO’s should utilize cyber security startups]]>
                </title>
                <pubDate>Wed, 25 Jan 2023 11:42:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/5725/episode/1389661</guid>
                                    <link>https://silverlining-il.castos.com/episodes/silverlining-episode-57-how-cisos-should-utilize-cyber-security-startups</link>
                                <description>
                                            <![CDATA[<p><strong>Guest: Shahar Geiger Maor</strong></p>
<p><strong>Guest Title:  CISO at DarioHealth</strong></p>
<p><strong>Language: English</strong></p>
<p> </p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Many of the CISOs are often approached by early stage startups asking to be given a chance. Is it worth it? isn't it too risky? </span></p>
<p><span style="font-weight:400;">Working with security start-ups can assist the CISO’s to accomplish their goals with many benefits, as long as risks are mitigated. </span></p>
<p><span style="font-weight:400;">In this episode we spoke with Shahar Gaiger Maor, CISO at DarioHealth to summarize how security startups can be your weapon of choice as a CISO.</span></p>
<p><span style="font-weight:400;">Link: </span><a href="https://www.linkedin.com/pulse/security-start-ups-design-shahar-geiger-maor" target="_blank" rel="noreferrer noopener"><span style="font-weight:400;">https://www.linkedin.com/pulse/security-start-ups-design-shahar-geiger-maor</span></a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Guest: Shahar Geiger Maor
Guest Title:  CISO at DarioHealth
Language: English
 
Abstract
Many of the CISOs are often approached by early stage startups asking to be given a chance. Is it worth it? isn't it too risky? 
Working with security start-ups can assist the CISO’s to accomplish their goals with many benefits, as long as risks are mitigated. 
In this episode we spoke with Shahar Gaiger Maor, CISO at DarioHealth to summarize how security startups can be your weapon of choice as a CISO.
Link: https://www.linkedin.com/pulse/security-start-ups-design-shahar-geiger-maor]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[SilverLining Episode 57: How CISO’s should utilize cyber security startups]]>
                </itunes:title>
                                    <itunes:episode>57</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Guest: Shahar Geiger Maor</strong></p>
<p><strong>Guest Title:  CISO at DarioHealth</strong></p>
<p><strong>Language: English</strong></p>
<p> </p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Many of the CISOs are often approached by early stage startups asking to be given a chance. Is it worth it? isn't it too risky? </span></p>
<p><span style="font-weight:400;">Working with security start-ups can assist the CISO’s to accomplish their goals with many benefits, as long as risks are mitigated. </span></p>
<p><span style="font-weight:400;">In this episode we spoke with Shahar Gaiger Maor, CISO at DarioHealth to summarize how security startups can be your weapon of choice as a CISO.</span></p>
<p><span style="font-weight:400;">Link: </span><a href="https://www.linkedin.com/pulse/security-start-ups-design-shahar-geiger-maor" target="_blank" rel="noreferrer noopener"><span style="font-weight:400;">https://www.linkedin.com/pulse/security-start-ups-design-shahar-geiger-maor</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/5725/d52a78c2-6227-4f31-8b18-9d7c91533008/Silver-lining-57.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F5725%2Fepisode%2F1389661&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fsilverlining-episode-57-how-cisos-should-utilize-cyber-security-startups&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=a98ae1430fa3ebfed6b35e9a764a1b49679fb009ef9ad30a60ab276db0d3e84a" length="66340980"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Guest: Shahar Geiger Maor
Guest Title:  CISO at DarioHealth
Language: English
 
Abstract
Many of the CISOs are often approached by early stage startups asking to be given a chance. Is it worth it? isn't it too risky? 
Working with security start-ups can assist the CISO’s to accomplish their goals with many benefits, as long as risks are mitigated. 
In this episode we spoke with Shahar Gaiger Maor, CISO at DarioHealth to summarize how security startups can be your weapon of choice as a CISO.
Link: https://www.linkedin.com/pulse/security-start-ups-design-shahar-geiger-maor]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/1389661/EP57.jpg"></itunes:image>
                                                                            <itunes:duration>00:27:38</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[SilverLining Episode 56: Researching Cloud giants security mechanisms]]>
                </title>
                <pubDate>Wed, 21 Dec 2022 12:26:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/5725/episode/1353795</guid>
                                    <link>https://silverlining-il.castos.com/episodes/silverlining-episode-56-researching-cloud-giants-security-mechanisms</link>
                                <description>
                                            <![CDATA[<p><strong>Guest: Vladi Sandler, Co-Founder &amp; CEO, Gafnit Amiga, VP of Research, Lightspin</strong></p>
<p><strong>Topic: Researching Cloud giants security mechanisms </strong></p>
<p><strong>Language: English</strong></p>
<p> </p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">The leading cloud providers these days are storing growing parts of human knowledge and businesses , and therefore their services require to be top notch in security and most of the time, they actually provide very resilient security services. But every now and then, a talented security researcher finds vulnerabilities even on the most mature services - In this episode we spoke with Vladi Sandler &amp; </span><a href="mailto:gafnit.a@lightspin.io" target="_blank" rel="noreferrer noopener"><span style="font-weight:400;">Gafnit Amiga</span></a><span style="font-weight:400;"> from Lightspin regarding the AWS RDS vulnerability they recently discovered and what is the process of researching cloud provider vulnerabilities and how to do responsible disclosure.  As a bonus, we also discussed the open-source tools released by Lightspin and the way they can help organizations protect their cloud resources.</span></p>
<p> </p>
<p><a href="https://blog.lightspin.io/aws-rds-critical-security-vulnerability" target="_blank" rel="noreferrer noopener"><span style="font-weight:400;">https://blog.lightspin.io/aws-rds-critical-security-vulnerability</span></a></p>
<p><a href="https://recon.cloud" target="_blank" rel="noreferrer noopener"><span style="font-weight:400;">https://recon.cloud</span></a><span style="font-weight:400;">  -  Free CNAPP tool</span></p>
<p><a href="https://github.com/lightspin-tech/red-detector" target="_blank" rel="noreferrer noopener"><span style="font-weight:400;">https://github.com/lightspin-tech/red-detector</span></a><span style="font-weight:400;"> - EC2 vulnerability scanner </span></p>
<p><a href="https://github.com/lightspin-tech/red-kube" target="_blank" rel="noreferrer noopener"><span style="font-weight:400;">https://github.com/lightspin-tech/red-kube</span></a><span style="font-weight:400;"> - K8S Adversary Emulation</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Guest: Vladi Sandler, Co-Founder & CEO, Gafnit Amiga, VP of Research, Lightspin
Topic: Researching Cloud giants security mechanisms 
Language: English
 
Abstract
The leading cloud providers these days are storing growing parts of human knowledge and businesses , and therefore their services require to be top notch in security and most of the time, they actually provide very resilient security services. But every now and then, a talented security researcher finds vulnerabilities even on the most mature services - In this episode we spoke with Vladi Sandler & Gafnit Amiga from Lightspin regarding the AWS RDS vulnerability they recently discovered and what is the process of researching cloud provider vulnerabilities and how to do responsible disclosure.  As a bonus, we also discussed the open-source tools released by Lightspin and the way they can help organizations protect their cloud resources.
 
https://blog.lightspin.io/aws-rds-critical-security-vulnerability
https://recon.cloud  -  Free CNAPP tool
https://github.com/lightspin-tech/red-detector - EC2 vulnerability scanner 
https://github.com/lightspin-tech/red-kube - K8S Adversary Emulation]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[SilverLining Episode 56: Researching Cloud giants security mechanisms]]>
                </itunes:title>
                                    <itunes:episode>56</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Guest: Vladi Sandler, Co-Founder &amp; CEO, Gafnit Amiga, VP of Research, Lightspin</strong></p>
<p><strong>Topic: Researching Cloud giants security mechanisms </strong></p>
<p><strong>Language: English</strong></p>
<p> </p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">The leading cloud providers these days are storing growing parts of human knowledge and businesses , and therefore their services require to be top notch in security and most of the time, they actually provide very resilient security services. But every now and then, a talented security researcher finds vulnerabilities even on the most mature services - In this episode we spoke with Vladi Sandler &amp; </span><a href="mailto:gafnit.a@lightspin.io" target="_blank" rel="noreferrer noopener"><span style="font-weight:400;">Gafnit Amiga</span></a><span style="font-weight:400;"> from Lightspin regarding the AWS RDS vulnerability they recently discovered and what is the process of researching cloud provider vulnerabilities and how to do responsible disclosure.  As a bonus, we also discussed the open-source tools released by Lightspin and the way they can help organizations protect their cloud resources.</span></p>
<p> </p>
<p><a href="https://blog.lightspin.io/aws-rds-critical-security-vulnerability" target="_blank" rel="noreferrer noopener"><span style="font-weight:400;">https://blog.lightspin.io/aws-rds-critical-security-vulnerability</span></a></p>
<p><a href="https://recon.cloud" target="_blank" rel="noreferrer noopener"><span style="font-weight:400;">https://recon.cloud</span></a><span style="font-weight:400;">  -  Free CNAPP tool</span></p>
<p><a href="https://github.com/lightspin-tech/red-detector" target="_blank" rel="noreferrer noopener"><span style="font-weight:400;">https://github.com/lightspin-tech/red-detector</span></a><span style="font-weight:400;"> - EC2 vulnerability scanner </span></p>
<p><a href="https://github.com/lightspin-tech/red-kube" target="_blank" rel="noreferrer noopener"><span style="font-weight:400;">https://github.com/lightspin-tech/red-kube</span></a><span style="font-weight:400;"> - K8S Adversary Emulation</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/5725/61868238-901b-4dad-be1e-f0cfdf6739f6/Silver-lining-56.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F5725%2Fepisode%2F1353795&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fsilverlining-episode-56-researching-cloud-giants-security-mechanisms&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=9d4beb1051b7fbb351ddf9eb67651f04b7be8d6e1ed5e92da5d68c8cf09820d1" length="56341548"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Guest: Vladi Sandler, Co-Founder & CEO, Gafnit Amiga, VP of Research, Lightspin
Topic: Researching Cloud giants security mechanisms 
Language: English
 
Abstract
The leading cloud providers these days are storing growing parts of human knowledge and businesses , and therefore their services require to be top notch in security and most of the time, they actually provide very resilient security services. But every now and then, a talented security researcher finds vulnerabilities even on the most mature services - In this episode we spoke with Vladi Sandler & Gafnit Amiga from Lightspin regarding the AWS RDS vulnerability they recently discovered and what is the process of researching cloud provider vulnerabilities and how to do responsible disclosure.  As a bonus, we also discussed the open-source tools released by Lightspin and the way they can help organizations protect their cloud resources.
 
https://blog.lightspin.io/aws-rds-critical-security-vulnerability
https://recon.cloud  -  Free CNAPP tool
https://github.com/lightspin-tech/red-detector - EC2 vulnerability scanner 
https://github.com/lightspin-tech/red-kube - K8S Adversary Emulation]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/1353795/EP56.jpg"></itunes:image>
                                                                            <itunes:duration>00:23:28</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[SilverLining Episode 55: Analyzing SaaS Applications Threats]]>
                </title>
                <pubDate>Wed, 09 Nov 2022 10:07:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://permalink.castos.com/podcast/5725/episode/1315000</guid>
                                    <link>https://silverlining-il.castos.com/episodes/silverlining-episode-55-analyzing-saas-applications-threats</link>
                                <description>
                                            <![CDATA[<p><strong>Guest: <a href="mailto:bg@canonic.security" target="_blank" rel="noreferrer noopener">Boris Gorin</a></strong></p>
<p><strong>Guest Title: CEO &amp; Co-Founder at Canonic</strong></p>
<p><strong>Topic: Analyzing SaaS Applications Threats</strong></p>
<p><strong>Language: English</strong></p>
<p><strong> </strong></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">The 2022 history of security incidents proved that SaaS services present major security challenges for organizations. As SaaS adoption grows - more attack vectors are being discovered. </span></p>
<p><span style="font-weight:400;">In this episode we spoke with Boris Gorin, Co-founder and CEO at Canonic about the attack vector of malicious apps inside SaaS services and the Canonic AppTotal portal for analyzing 3rd party applications.</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Guest: Boris Gorin
Guest Title: CEO & Co-Founder at Canonic
Topic: Analyzing SaaS Applications Threats
Language: English
 
Abstract
The 2022 history of security incidents proved that SaaS services present major security challenges for organizations. As SaaS adoption grows - more attack vectors are being discovered. 
In this episode we spoke with Boris Gorin, Co-founder and CEO at Canonic about the attack vector of malicious apps inside SaaS services and the Canonic AppTotal portal for analyzing 3rd party applications.]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[SilverLining Episode 55: Analyzing SaaS Applications Threats]]>
                </itunes:title>
                                    <itunes:episode>55</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Guest: <a href="mailto:bg@canonic.security" target="_blank" rel="noreferrer noopener">Boris Gorin</a></strong></p>
<p><strong>Guest Title: CEO &amp; Co-Founder at Canonic</strong></p>
<p><strong>Topic: Analyzing SaaS Applications Threats</strong></p>
<p><strong>Language: English</strong></p>
<p><strong> </strong></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">The 2022 history of security incidents proved that SaaS services present major security challenges for organizations. As SaaS adoption grows - more attack vectors are being discovered. </span></p>
<p><span style="font-weight:400;">In this episode we spoke with Boris Gorin, Co-founder and CEO at Canonic about the attack vector of malicious apps inside SaaS services and the Canonic AppTotal portal for analyzing 3rd party applications.</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/5725/4ef445ca-6191-4f7e-8e28-6d26233622d7/Silver-lining-55.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fpermalink.castos.com%2Fpodcast%2F5725%2Fepisode%2F1315000&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fsilverlining-episode-55-analyzing-saas-applications-threats&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=dc16d2ae04991cb6978c8be92a93be6325efcc9240f6b671dd3537763cf5a344" length="53290980"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Guest: Boris Gorin
Guest Title: CEO & Co-Founder at Canonic
Topic: Analyzing SaaS Applications Threats
Language: English
 
Abstract
The 2022 history of security incidents proved that SaaS services present major security challenges for organizations. As SaaS adoption grows - more attack vectors are being discovered. 
In this episode we spoke with Boris Gorin, Co-founder and CEO at Canonic about the attack vector of malicious apps inside SaaS services and the Canonic AppTotal portal for analyzing 3rd party applications.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/1315000/EP55.jpg"></itunes:image>
                                                                            <itunes:duration>00:22:12</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[SilverLining Episode 54: Threats on CI/CD pipeline ]]>
                </title>
                <pubDate>Wed, 21 Sep 2022 05:00:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/silverlining-episode-54-threats-on-cicd-pipeline</guid>
                                    <link>https://silverlining-il.castos.com/episodes/silverlining-episode-54-threats-on-cicd-pipeline</link>
                                <description>
                                            <![CDATA[<p><strong>Guest: Guy Flechter</strong></p>
<p><strong>Guest Title: CEO &amp; Co-Founder at Cider Security</strong></p>
<p><strong>Topic: Threats on CI/CD pipeline </strong></p>
<p><strong>Language: English</strong></p>
<p><strong> </strong></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">The main attraction point in cloud for most organizations is the ability to produce scalable and resilient applications - faster. One of the main foundations for that is the ability to create CI/CD pipelines that will automate the integration of new code to old code and the deployment of the code to the various testing and production environments. </span>But as organizations continue to adopt CI/CD - there is an increasing number of attacks on the pipelines.</p>
<p>In this episode we spoke with Guy Flechter, Co-founder and CEO at Cider Security - on CI/CD relevant threats and risks and incidents that happened in the past and things we can learn from them.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Guest: Guy Flechter
Guest Title: CEO & Co-Founder at Cider Security
Topic: Threats on CI/CD pipeline 
Language: English
 
Abstract
The main attraction point in cloud for most organizations is the ability to produce scalable and resilient applications - faster. One of the main foundations for that is the ability to create CI/CD pipelines that will automate the integration of new code to old code and the deployment of the code to the various testing and production environments. But as organizations continue to adopt CI/CD - there is an increasing number of attacks on the pipelines.
In this episode we spoke with Guy Flechter, Co-founder and CEO at Cider Security - on CI/CD relevant threats and risks and incidents that happened in the past and things we can learn from them.]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[SilverLining Episode 54: Threats on CI/CD pipeline ]]>
                </itunes:title>
                                    <itunes:episode>54</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Guest: Guy Flechter</strong></p>
<p><strong>Guest Title: CEO &amp; Co-Founder at Cider Security</strong></p>
<p><strong>Topic: Threats on CI/CD pipeline </strong></p>
<p><strong>Language: English</strong></p>
<p><strong> </strong></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">The main attraction point in cloud for most organizations is the ability to produce scalable and resilient applications - faster. One of the main foundations for that is the ability to create CI/CD pipelines that will automate the integration of new code to old code and the deployment of the code to the various testing and production environments. </span>But as organizations continue to adopt CI/CD - there is an increasing number of attacks on the pipelines.</p>
<p>In this episode we spoke with Guy Flechter, Co-founder and CEO at Cider Security - on CI/CD relevant threats and risks and incidents that happened in the past and things we can learn from them.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/5725/07c9d951-b7ba-4ef6-b979-95818e965e81/silver-lining54.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fsilverlining-episode-54-threats-on-cicd-pipeline&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fsilverlining-episode-54-threats-on-cicd-pipeline&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=feab5764ceb4383d7b079a1e92652d6c4880bc8cf02e8b25e1f06c50b28b9d65" length="74592756"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Guest: Guy Flechter
Guest Title: CEO & Co-Founder at Cider Security
Topic: Threats on CI/CD pipeline 
Language: English
 
Abstract
The main attraction point in cloud for most organizations is the ability to produce scalable and resilient applications - faster. One of the main foundations for that is the ability to create CI/CD pipelines that will automate the integration of new code to old code and the deployment of the code to the various testing and production environments. But as organizations continue to adopt CI/CD - there is an increasing number of attacks on the pipelines.
In this episode we spoke with Guy Flechter, Co-founder and CEO at Cider Security - on CI/CD relevant threats and risks and incidents that happened in the past and things we can learn from them.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/1275054/EP54.jpg"></itunes:image>
                                                                            <itunes:duration>00:31:04</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[SilverLining Episode 53: Automating Infrastructure Pipelines]]>
                </title>
                <pubDate>Thu, 25 Aug 2022 11:28:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/silverlining-episode-53-automating-infrastructure-pipelines</guid>
                                    <link>https://silverlining-il.castos.com/episodes/silverlining-episode-53-automating-infrastructure-pipelines</link>
                                <description>
                                            <![CDATA[<p><strong>Guest: Rob Hirschfeld </strong></p>
<p><strong>Guest Title: CEO &amp; Co-Founder at RackN</strong></p>
<p><strong>Topic: Automating Infrastructure Pipelines</strong></p>
<p><strong>Language: English</strong></p>
<p><strong> </strong></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">In modern applications, Infrastructure automation is an important piece in the puzzle. Manual infrastructure management and security tasks in the volume required for modern application will probably lead to mistakes, misconfigurations and non compliance platforms. </span></p>
<p><span style="font-weight:400;"> In this episode we spoke with Rob Hirschfeld, CEO and Co-Founder at RackN, about Infrastructure as code and how organizations should automate their infrastructure pipeline.</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Guest: Rob Hirschfeld 
Guest Title: CEO & Co-Founder at RackN
Topic: Automating Infrastructure Pipelines
Language: English
 
Abstract
In modern applications, Infrastructure automation is an important piece in the puzzle. Manual infrastructure management and security tasks in the volume required for modern application will probably lead to mistakes, misconfigurations and non compliance platforms. 
 In this episode we spoke with Rob Hirschfeld, CEO and Co-Founder at RackN, about Infrastructure as code and how organizations should automate their infrastructure pipeline.]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[SilverLining Episode 53: Automating Infrastructure Pipelines]]>
                </itunes:title>
                                    <itunes:episode>53</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Guest: Rob Hirschfeld </strong></p>
<p><strong>Guest Title: CEO &amp; Co-Founder at RackN</strong></p>
<p><strong>Topic: Automating Infrastructure Pipelines</strong></p>
<p><strong>Language: English</strong></p>
<p><strong> </strong></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">In modern applications, Infrastructure automation is an important piece in the puzzle. Manual infrastructure management and security tasks in the volume required for modern application will probably lead to mistakes, misconfigurations and non compliance platforms. </span></p>
<p><span style="font-weight:400;"> In this episode we spoke with Rob Hirschfeld, CEO and Co-Founder at RackN, about Infrastructure as code and how organizations should automate their infrastructure pipeline.</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/5725/1460594c-c129-44b1-a5fa-10068483dd4c/silver-lining-53.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fsilverlining-episode-53-automating-infrastructure-pipelines&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fsilverlining-episode-53-automating-infrastructure-pipelines&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=51bbd581f86ecb60017e4babc6315e3831cb20b5f1d4a89eba2be3c16880e802" length="74250348"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Guest: Rob Hirschfeld 
Guest Title: CEO & Co-Founder at RackN
Topic: Automating Infrastructure Pipelines
Language: English
 
Abstract
In modern applications, Infrastructure automation is an important piece in the puzzle. Manual infrastructure management and security tasks in the volume required for modern application will probably lead to mistakes, misconfigurations and non compliance platforms. 
 In this episode we spoke with Rob Hirschfeld, CEO and Co-Founder at RackN, about Infrastructure as code and how organizations should automate their infrastructure pipeline.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/1246569/EP53-2.jpg"></itunes:image>
                                                                            <itunes:duration>00:30:56</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[SilverLining Episode 52: Securing K8’s Deployments ]]>
                </title>
                <pubDate>Wed, 13 Jul 2022 05:17:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/silverlining-episode-52-securing-k8s-deployments</guid>
                                    <link>https://silverlining-il.castos.com/episodes/silverlining-episode-52-securing-k8s-deployments</link>
                                <description>
                                            <![CDATA[<p><strong>Guest: <a href="mailto:leonid@armosec.io" target="_blank" rel="noreferrer noopener">Leonid Sandler</a></strong></p>
<p><strong>Guest title: CTO, Armosec</strong></p>
<p><strong>Topic: Securing K8’s Deployments </strong></p>
<p><strong>Language: English</strong></p>
<p><strong> </strong></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">As K8’s adoption grows and matures, we sat down with Leonid Sandler, CTO and Co-Founder of ARMO, to talk about K8’s security - starting from the shared responsibility model, going through the initial configuration and deployment, and all the way to building a runtime protection solution. </span></p>
<p><span style="font-weight:400;">ARMO github page - </span><a href="https://github.com/armosec/kubescape" target="_blank" rel="noreferrer noopener"><span style="font-weight:400;">https://github.com/armosec/kubescape</span></a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Guest: Leonid Sandler
Guest title: CTO, Armosec
Topic: Securing K8’s Deployments 
Language: English
 
Abstract
As K8’s adoption grows and matures, we sat down with Leonid Sandler, CTO and Co-Founder of ARMO, to talk about K8’s security - starting from the shared responsibility model, going through the initial configuration and deployment, and all the way to building a runtime protection solution. 
ARMO github page - https://github.com/armosec/kubescape]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[SilverLining Episode 52: Securing K8’s Deployments ]]>
                </itunes:title>
                                    <itunes:episode>52</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Guest: <a href="mailto:leonid@armosec.io" target="_blank" rel="noreferrer noopener">Leonid Sandler</a></strong></p>
<p><strong>Guest title: CTO, Armosec</strong></p>
<p><strong>Topic: Securing K8’s Deployments </strong></p>
<p><strong>Language: English</strong></p>
<p><strong> </strong></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">As K8’s adoption grows and matures, we sat down with Leonid Sandler, CTO and Co-Founder of ARMO, to talk about K8’s security - starting from the shared responsibility model, going through the initial configuration and deployment, and all the way to building a runtime protection solution. </span></p>
<p><span style="font-weight:400;">ARMO github page - </span><a href="https://github.com/armosec/kubescape" target="_blank" rel="noreferrer noopener"><span style="font-weight:400;">https://github.com/armosec/kubescape</span></a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/5725/29661f7a-b7ce-4abc-8d16-43a723904fc9/silver-lining-52.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fsilverlining-episode-52-securing-k8s-deployments&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fsilverlining-episode-52-securing-k8s-deployments&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=c0d59546822ed28186eb7e0e447c1acc60e4656844038282c4ffee2f73d23a62" length="78246756"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Guest: Leonid Sandler
Guest title: CTO, Armosec
Topic: Securing K8’s Deployments 
Language: English
 
Abstract
As K8’s adoption grows and matures, we sat down with Leonid Sandler, CTO and Co-Founder of ARMO, to talk about K8’s security - starting from the shared responsibility model, going through the initial configuration and deployment, and all the way to building a runtime protection solution. 
ARMO github page - https://github.com/armosec/kubescape]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/1190991/EP52-2.jpg"></itunes:image>
                                                                            <itunes:duration>00:32:36</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[SilverLining Episode 51: Understanding 5G Networks]]>
                </title>
                <pubDate>Wed, 22 Jun 2022 05:04:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/silverlining-episode-51-understanding-5g-networks-1</guid>
                                    <link>https://silverlining-il.castos.com/episodes/silverlining-episode-51-understanding-5g-networks-1</link>
                                <description>
                                            <![CDATA[<p><strong>Guest: Niv David </strong></p>
<p><strong>Guest title: Customer Cyber Security Director, Ericsson North America; Fellow &amp; Lecturer, Yuval Ne'eman Workshop for Science, Technology and Security, Tel-Aviv University </strong></p>
<p><strong>Language: English</strong></p>
<p><strong> </strong></p>
<p><strong>Abstract</strong></p>
<p>The 5th generation of cellular networks is not just an upgrade of previous generations such as LTE. 5G is changing the cellular networks infrastructure, deployment, orchestration, operations and security. 5G infrastructure, and Private Networks, blur the traditional distinction between IT, 3GPP, Wi-Fi and Cellular, providing incredible functionality, while creating new challenges.</p>
<p>In this episode we spoke with Niv David, Customer Cyber security director at Ericsson North America, about the innovation of 5G networks and how it is changing the networking infrastructure and cloud usage.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Guest: Niv David 
Guest title: Customer Cyber Security Director, Ericsson North America; Fellow & Lecturer, Yuval Ne'eman Workshop for Science, Technology and Security, Tel-Aviv University 
Language: English
 
Abstract
The 5th generation of cellular networks is not just an upgrade of previous generations such as LTE. 5G is changing the cellular networks infrastructure, deployment, orchestration, operations and security. 5G infrastructure, and Private Networks, blur the traditional distinction between IT, 3GPP, Wi-Fi and Cellular, providing incredible functionality, while creating new challenges.
In this episode we spoke with Niv David, Customer Cyber security director at Ericsson North America, about the innovation of 5G networks and how it is changing the networking infrastructure and cloud usage.]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[SilverLining Episode 51: Understanding 5G Networks]]>
                </itunes:title>
                                    <itunes:episode>51</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Guest: Niv David </strong></p>
<p><strong>Guest title: Customer Cyber Security Director, Ericsson North America; Fellow &amp; Lecturer, Yuval Ne'eman Workshop for Science, Technology and Security, Tel-Aviv University </strong></p>
<p><strong>Language: English</strong></p>
<p><strong> </strong></p>
<p><strong>Abstract</strong></p>
<p>The 5th generation of cellular networks is not just an upgrade of previous generations such as LTE. 5G is changing the cellular networks infrastructure, deployment, orchestration, operations and security. 5G infrastructure, and Private Networks, blur the traditional distinction between IT, 3GPP, Wi-Fi and Cellular, providing incredible functionality, while creating new challenges.</p>
<p>In this episode we spoke with Niv David, Customer Cyber security director at Ericsson North America, about the innovation of 5G networks and how it is changing the networking infrastructure and cloud usage.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/5725/346f4c7a-7156-400e-958d-5546b7ea0d51/Silver-lining-51.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fsilverlining-episode-51-understanding-5g-networks-1&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fsilverlining-episode-51-understanding-5g-networks-1&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=fcdd672e72d9f5b9827a634b8a70b193413143fda55267fdf38b3e9dd75defd3" length="79698348"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Guest: Niv David 
Guest title: Customer Cyber Security Director, Ericsson North America; Fellow & Lecturer, Yuval Ne'eman Workshop for Science, Technology and Security, Tel-Aviv University 
Language: English
 
Abstract
The 5th generation of cellular networks is not just an upgrade of previous generations such as LTE. 5G is changing the cellular networks infrastructure, deployment, orchestration, operations and security. 5G infrastructure, and Private Networks, blur the traditional distinction between IT, 3GPP, Wi-Fi and Cellular, providing incredible functionality, while creating new challenges.
In this episode we spoke with Niv David, Customer Cyber security director at Ericsson North America, about the innovation of 5G networks and how it is changing the networking infrastructure and cloud usage.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/EP51-Photo2.jpg"></itunes:image>
                                                                            <itunes:duration>00:33:12</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[SilverLining Episode 50: Building security workflow at scale ]]>
                </title>
                <pubDate>Wed, 11 May 2022 05:26:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/silverlining-episode-50-building-security-workflow-at-scale</guid>
                                    <link>https://silverlining-il.castos.com/episodes/silverlining-episode-50-building-security-workflow-at-scale</link>
                                <description>
                                            <![CDATA[<p><strong>Guest: Ravid Circus </strong></p>
<p><strong>Guest title: Co-Founder, Seemplicity </strong></p>
<p><strong>Language: English</strong></p>
<p><strong> </strong></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">As organizations develop more software, and in faster cycles, greater responsibility is laid on security teams who have a full-stack responsibility for infrastructure, applications, IT services and many other aspects in the business.</span></p>
<p><span style="font-weight:400;">In this episode we spoke with </span><a href="mailto:ravid@seemplicity.io"><span style="font-weight:400;">Ravid Circus</span></a> <span style="font-weight:400;">co-founder and CPO at Seemplicity to understand how security teams can efficiently scale their risk reduction efforts and interact with their counterparts productively by using digital workflows  for security operations.</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Guest: Ravid Circus 
Guest title: Co-Founder, Seemplicity 
Language: English
 
Abstract
As organizations develop more software, and in faster cycles, greater responsibility is laid on security teams who have a full-stack responsibility for infrastructure, applications, IT services and many other aspects in the business.
In this episode we spoke with Ravid Circus co-founder and CPO at Seemplicity to understand how security teams can efficiently scale their risk reduction efforts and interact with their counterparts productively by using digital workflows  for security operations.]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[SilverLining Episode 50: Building security workflow at scale ]]>
                </itunes:title>
                                    <itunes:episode>50</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Guest: Ravid Circus </strong></p>
<p><strong>Guest title: Co-Founder, Seemplicity </strong></p>
<p><strong>Language: English</strong></p>
<p><strong> </strong></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">As organizations develop more software, and in faster cycles, greater responsibility is laid on security teams who have a full-stack responsibility for infrastructure, applications, IT services and many other aspects in the business.</span></p>
<p><span style="font-weight:400;">In this episode we spoke with </span><a href="mailto:ravid@seemplicity.io"><span style="font-weight:400;">Ravid Circus</span></a> <span style="font-weight:400;">co-founder and CPO at Seemplicity to understand how security teams can efficiently scale their risk reduction efforts and interact with their counterparts productively by using digital workflows  for security operations.</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/5725/c685e87f-4fe7-4a1d-af45-84a9c2389d00/Silver-lining-50.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fsilverlining-episode-50-building-security-workflow-at-scale&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fsilverlining-episode-50-building-security-workflow-at-scale&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=92f8809875722820c860fba4c71fcd3f2326876ee84e92b076126d730745e6ce" length="58811652"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Guest: Ravid Circus 
Guest title: Co-Founder, Seemplicity 
Language: English
 
Abstract
As organizations develop more software, and in faster cycles, greater responsibility is laid on security teams who have a full-stack responsibility for infrastructure, applications, IT services and many other aspects in the business.
In this episode we spoke with Ravid Circus co-founder and CPO at Seemplicity to understand how security teams can efficiently scale their risk reduction efforts and interact with their counterparts productively by using digital workflows  for security operations.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/EP50-SilveeLining.jpg"></itunes:image>
                                                                            <itunes:duration>00:24:30</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[SilverLining Episode 49: Security for Fintech Companies]]>
                </title>
                <pubDate>Wed, 06 Apr 2022 05:00:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/silverlining-episode-49-security-for-fintech-companies</guid>
                                    <link>https://silverlining-il.castos.com/episodes/silverlining-episode-49-security-for-fintech-companies</link>
                                <description>
                                            <![CDATA[<p><strong>Guest: Alex Gestin</strong></p>
<p><strong>Guest title:  CISO, Riseup</strong></p>
<p><strong>Language: English</strong></p>
<p><strong> </strong></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">The growing number of fintech companies represent a shift in the market from traditional banking &amp;  financing to new models and tools that are empowered by technology. But fintech companies face security challenges - they need to provide customers and financial partners with assurance &amp; security at a level of giant institutes - while being young and small companies. </span></p>
<p><span style="font-weight:400;">I</span><span style="font-weight:400;">n this episode we spoke with Alex Gestin, CISO for Riseup - about the challenges of Fintech companies and how Riseup builds environments that provide assurance and trust with regulators, consumers and other banks.</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Guest: Alex Gestin
Guest title:  CISO, Riseup
Language: English
 
Abstract
The growing number of fintech companies represent a shift in the market from traditional banking &  financing to new models and tools that are empowered by technology. But fintech companies face security challenges - they need to provide customers and financial partners with assurance & security at a level of giant institutes - while being young and small companies. 
In this episode we spoke with Alex Gestin, CISO for Riseup - about the challenges of Fintech companies and how Riseup builds environments that provide assurance and trust with regulators, consumers and other banks.]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[SilverLining Episode 49: Security for Fintech Companies]]>
                </itunes:title>
                                    <itunes:episode>49</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Guest: Alex Gestin</strong></p>
<p><strong>Guest title:  CISO, Riseup</strong></p>
<p><strong>Language: English</strong></p>
<p><strong> </strong></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">The growing number of fintech companies represent a shift in the market from traditional banking &amp;  financing to new models and tools that are empowered by technology. But fintech companies face security challenges - they need to provide customers and financial partners with assurance &amp; security at a level of giant institutes - while being young and small companies. </span></p>
<p><span style="font-weight:400;">I</span><span style="font-weight:400;">n this episode we spoke with Alex Gestin, CISO for Riseup - about the challenges of Fintech companies and how Riseup builds environments that provide assurance and trust with regulators, consumers and other banks.</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/5725/4c0491b9-eaf6-46be-b9a1-89a8d054d20a/EP49-Audio.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fsilverlining-episode-49-security-for-fintech-companies&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fsilverlining-episode-49-security-for-fintech-companies&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=d63b4253cc69a1e7e10d93f0797a0a0ee645ae8b3370e64d0439d213659145d4" length="89930160"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Guest: Alex Gestin
Guest title:  CISO, Riseup
Language: English
 
Abstract
The growing number of fintech companies represent a shift in the market from traditional banking &  financing to new models and tools that are empowered by technology. But fintech companies face security challenges - they need to provide customers and financial partners with assurance & security at a level of giant institutes - while being young and small companies. 
In this episode we spoke with Alex Gestin, CISO for Riseup - about the challenges of Fintech companies and how Riseup builds environments that provide assurance and trust with regulators, consumers and other banks.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/EP49-2.jpg"></itunes:image>
                                                                            <itunes:duration>00:37:28</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[SilverLining Episode 48: Deep dive into Confidential computing ]]>
                </title>
                <pubDate>Wed, 16 Mar 2022 06:00:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/silverlining-episode-48-deep-dive-into-confidential-computing</guid>
                                    <link>https://silverlining-il.castos.com/episodes/silverlining-episode-48-deep-dive-into-confidential-computing</link>
                                <description>
                                            <![CDATA[<p><strong>Guest: Yan Michalevsky</strong></p>
<p><strong>Guest title:  Co-Founder and CTO at Anjuna</strong></p>
<p><strong>Language: English</strong></p>
<p><strong> </strong></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Confidential computing is one of the more interesting technologies that is developed today. </span></p>
<p><span style="font-weight:400;">The combination of using secure hardware features, advanced cryptography with tight virtualization integration enables us to protect data at untrusted environments and protect from very illusive threats such as government access and malicious insiders. </span></p>
<p><span style="font-weight:400;">In this episode we spoke with Yan Michalevsky, Co-Founder and CTO at Anjuna, regarding confidential computing and why we should pay attention to it.</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Guest: Yan Michalevsky
Guest title:  Co-Founder and CTO at Anjuna
Language: English
 
Abstract
Confidential computing is one of the more interesting technologies that is developed today. 
The combination of using secure hardware features, advanced cryptography with tight virtualization integration enables us to protect data at untrusted environments and protect from very illusive threats such as government access and malicious insiders. 
In this episode we spoke with Yan Michalevsky, Co-Founder and CTO at Anjuna, regarding confidential computing and why we should pay attention to it.]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[SilverLining Episode 48: Deep dive into Confidential computing ]]>
                </itunes:title>
                                    <itunes:episode>48</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Guest: Yan Michalevsky</strong></p>
<p><strong>Guest title:  Co-Founder and CTO at Anjuna</strong></p>
<p><strong>Language: English</strong></p>
<p><strong> </strong></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Confidential computing is one of the more interesting technologies that is developed today. </span></p>
<p><span style="font-weight:400;">The combination of using secure hardware features, advanced cryptography with tight virtualization integration enables us to protect data at untrusted environments and protect from very illusive threats such as government access and malicious insiders. </span></p>
<p><span style="font-weight:400;">In this episode we spoke with Yan Michalevsky, Co-Founder and CTO at Anjuna, regarding confidential computing and why we should pay attention to it.</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/5725/ba2be180-deb6-43b0-86a7-a47bb2051321/Silver-lining-48.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fsilverlining-episode-48-deep-dive-into-confidential-computing&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fsilverlining-episode-48-deep-dive-into-confidential-computing&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=d23a18554010676ba59ace5657f2b04e687f69386627a33da8e8907ee0acfd6d" length="89294508"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Guest: Yan Michalevsky
Guest title:  Co-Founder and CTO at Anjuna
Language: English
 
Abstract
Confidential computing is one of the more interesting technologies that is developed today. 
The combination of using secure hardware features, advanced cryptography with tight virtualization integration enables us to protect data at untrusted environments and protect from very illusive threats such as government access and malicious insiders. 
In this episode we spoke with Yan Michalevsky, Co-Founder and CTO at Anjuna, regarding confidential computing and why we should pay attention to it.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/EP48.jpg"></itunes:image>
                                                                            <itunes:duration>00:37:12</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[SilverLining Episode 47: Understanding Service Mesh Technologies]]>
                </title>
                <pubDate>Wed, 23 Feb 2022 06:00:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/silverlining-episode-47-understanding-service-mesh-technologies</guid>
                                    <link>https://silverlining-il.castos.com/episodes/silverlining-episode-47-understanding-service-mesh-technologies</link>
                                <description>
                                            <![CDATA[<p><strong>Guest: Oren Penso</strong></p>
<p><strong>Guest title: Senior Product Line Manager, VMware</strong></p>
<p><strong>Language: English</strong></p>
<p> </p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">As k8’s adoption grows and flourish, organizations are starting to ask themselves how they should manage the complex network settings inside K8’s. </span></p>
<p><span style="font-weight:400;">Services mesh is a technology that adds a layer of networking &amp; security capabilities on top of traditional K8’s environment. </span></p>
<p><span style="font-weight:400;">In this episode we discuss service mesh technology, its past and its future with Oren Penso, Senior product line manager in VMware and he provided us with interesting insights on the future on networking &amp; microservices architecture. </span> </p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Guest: Oren Penso
Guest title: Senior Product Line Manager, VMware
Language: English
 
Abstract
As k8’s adoption grows and flourish, organizations are starting to ask themselves how they should manage the complex network settings inside K8’s. 
Services mesh is a technology that adds a layer of networking & security capabilities on top of traditional K8’s environment. 
In this episode we discuss service mesh technology, its past and its future with Oren Penso, Senior product line manager in VMware and he provided us with interesting insights on the future on networking & microservices architecture.  ]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[SilverLining Episode 47: Understanding Service Mesh Technologies]]>
                </itunes:title>
                                    <itunes:episode>47</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Guest: Oren Penso</strong></p>
<p><strong>Guest title: Senior Product Line Manager, VMware</strong></p>
<p><strong>Language: English</strong></p>
<p> </p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">As k8’s adoption grows and flourish, organizations are starting to ask themselves how they should manage the complex network settings inside K8’s. </span></p>
<p><span style="font-weight:400;">Services mesh is a technology that adds a layer of networking &amp; security capabilities on top of traditional K8’s environment. </span></p>
<p><span style="font-weight:400;">In this episode we discuss service mesh technology, its past and its future with Oren Penso, Senior product line manager in VMware and he provided us with interesting insights on the future on networking &amp; microservices architecture. </span> </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/5725/134566b3-a7ee-4482-be62-2a57e236cae7/silver-lining-47.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fsilverlining-episode-47-understanding-service-mesh-technologies&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fsilverlining-episode-47-understanding-service-mesh-technologies&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=6a73d639f37d8a98a56f5d280dfdc601aba2bdc19db34301e9f698f9837715be" length="72970380"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Guest: Oren Penso
Guest title: Senior Product Line Manager, VMware
Language: English
 
Abstract
As k8’s adoption grows and flourish, organizations are starting to ask themselves how they should manage the complex network settings inside K8’s. 
Services mesh is a technology that adds a layer of networking & security capabilities on top of traditional K8’s environment. 
In this episode we discuss service mesh technology, its past and its future with Oren Penso, Senior product line manager in VMware and he provided us with interesting insights on the future on networking & microservices architecture.  ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/EP47.jpg"></itunes:image>
                                                                            <itunes:duration>00:30:24</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[SilverLining Episode 46: Securing Small & Medium businesses]]>
                </title>
                <pubDate>Wed, 09 Feb 2022 06:13:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/silverlining-episode-46-securing-small-medium-businesses</guid>
                                    <link>https://silverlining-il.castos.com/episodes/silverlining-episode-46-securing-small-medium-businesses</link>
                                <description>
                                            <![CDATA[<p><strong>Guest: Alex Peleg</strong></p>
<p><strong>Guest title: Co-founder and CVO at Cynergy</strong></p>
<p><strong>Language: English</strong></p>
<p> </p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Small and medium businesses are currently the most vulnerable sector in the market. They don’t have the knowledge and awareness to secure their own operations, and security vendors and IT services companies often neglect this sector. </span></p>
<p><span style="font-weight:400;">In this episode we spoke with Alex Peleg, CVO at Cynergy, on the challenges of securing SMB and how regulators, Security vendors and the security community should bridge the gap of knowledge and awareness in the SMB market.</span></p>
<p> </p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Guest: Alex Peleg
Guest title: Co-founder and CVO at Cynergy
Language: English
 
Abstract
Small and medium businesses are currently the most vulnerable sector in the market. They don’t have the knowledge and awareness to secure their own operations, and security vendors and IT services companies often neglect this sector. 
In this episode we spoke with Alex Peleg, CVO at Cynergy, on the challenges of securing SMB and how regulators, Security vendors and the security community should bridge the gap of knowledge and awareness in the SMB market.
 ]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[SilverLining Episode 46: Securing Small & Medium businesses]]>
                </itunes:title>
                                    <itunes:episode>46</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Guest: Alex Peleg</strong></p>
<p><strong>Guest title: Co-founder and CVO at Cynergy</strong></p>
<p><strong>Language: English</strong></p>
<p> </p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Small and medium businesses are currently the most vulnerable sector in the market. They don’t have the knowledge and awareness to secure their own operations, and security vendors and IT services companies often neglect this sector. </span></p>
<p><span style="font-weight:400;">In this episode we spoke with Alex Peleg, CVO at Cynergy, on the challenges of securing SMB and how regulators, Security vendors and the security community should bridge the gap of knowledge and awareness in the SMB market.</span></p>
<p> </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/5725/529ae679-fb5f-4ab9-a6e2-f0d97615f960/silver-lining-46.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fsilverlining-episode-46-securing-small-medium-businesses&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fsilverlining-episode-46-securing-small-medium-businesses&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=1349e71008048e33dbfc4d77a7e555ddbaf46ec00e91d2f540d974b90dbbb7a8" length="66410028"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Guest: Alex Peleg
Guest title: Co-founder and CVO at Cynergy
Language: English
 
Abstract
Small and medium businesses are currently the most vulnerable sector in the market. They don’t have the knowledge and awareness to secure their own operations, and security vendors and IT services companies often neglect this sector. 
In this episode we spoke with Alex Peleg, CVO at Cynergy, on the challenges of securing SMB and how regulators, Security vendors and the security community should bridge the gap of knowledge and awareness in the SMB market.
 ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/EP46.JPG"></itunes:image>
                                                                            <itunes:duration>00:27:40</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[SilverLining Episode 45: Incident response at scale ]]>
                </title>
                <pubDate>Wed, 26 Jan 2022 06:00:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/silverlining-episode-45-incident-response-at-scale</guid>
                                    <link>https://silverlining-il.castos.com/episodes/silverlining-episode-45-incident-response-at-scale</link>
                                <description>
                                            <![CDATA[<p><strong>Guest: Omri Segev Moyal</strong></p>
<p><strong>Guest title: Co-Founder and CEO at Profero</strong></p>
<p><strong>Language: English</strong></p>
<p> </p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Incident response and forensics of cloud breaches is one of the most challenging topics in Information security. In this episode, (recording date Aug 2021) Omri Segev Moyal, co-founder &amp; CEO at Profero, shares fascinating stories regarding recent incidents his team was involved in and provides insights, recommendations and best practices that are really eye opening for any organization out there. </span></p>
<p> </p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Guest: Omri Segev Moyal
Guest title: Co-Founder and CEO at Profero
Language: English
 
Abstract
Incident response and forensics of cloud breaches is one of the most challenging topics in Information security. In this episode, (recording date Aug 2021) Omri Segev Moyal, co-founder & CEO at Profero, shares fascinating stories regarding recent incidents his team was involved in and provides insights, recommendations and best practices that are really eye opening for any organization out there. 
 ]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[SilverLining Episode 45: Incident response at scale ]]>
                </itunes:title>
                                    <itunes:episode>45</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Guest: Omri Segev Moyal</strong></p>
<p><strong>Guest title: Co-Founder and CEO at Profero</strong></p>
<p><strong>Language: English</strong></p>
<p> </p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Incident response and forensics of cloud breaches is one of the most challenging topics in Information security. In this episode, (recording date Aug 2021) Omri Segev Moyal, co-founder &amp; CEO at Profero, shares fascinating stories regarding recent incidents his team was involved in and provides insights, recommendations and best practices that are really eye opening for any organization out there. </span></p>
<p> </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/1/7372de10-fbd6-4a5e-b1a4-cf53814db2e3/silver-lining-45.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fsilverlining-episode-45-incident-response-at-scale&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fsilverlining-episode-45-incident-response-at-scale&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=bdda1ec341c22661c6e13786475134921133d5916c0fe5c95f2043576f3c23ee" length="101461548"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Guest: Omri Segev Moyal
Guest title: Co-Founder and CEO at Profero
Language: English
 
Abstract
Incident response and forensics of cloud breaches is one of the most challenging topics in Information security. In this episode, (recording date Aug 2021) Omri Segev Moyal, co-founder & CEO at Profero, shares fascinating stories regarding recent incidents his team was involved in and provides insights, recommendations and best practices that are really eye opening for any organization out there. 
 ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/EP45.JPG"></itunes:image>
                                                                            <itunes:duration>00:42:16</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[SilverLining Episode 44: Gaining cloud security knowledge & certification - Part 2]]>
                </title>
                <pubDate>Wed, 22 Dec 2021 06:44:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/silverlining-episode-44-gaining-cloud-security-knowledge-certification-part-2</guid>
                                    <link>https://silverlining-il.castos.com/episodes/silverlining-episode-44-gaining-cloud-security-knowledge-certification-part-2</link>
                                <description>
                                            <![CDATA[<h4>Guest<strong>:</strong> <a href="https://diycyberguy.com/">David W. Schropfer</a></h4>
<h4>Guest Title: Host of DIY <a href="https://diycyberguy.com/" target="_blank" rel="noreferrer noopener">Cyber Guy</a> Podcast</h4>
<h4>Abstract: </h4>
<p>Many IT &amp; security professionals are asking what Is the best way to enter the world of cloud computing. <span style="font-weight:400;">In this episode we continue our conversation with David</span><a href="https://diycyberguy.com/"><span style="font-weight:400;"> W. Schropfer</span></a><span style="font-weight:400;"> from </span><span style="font-weight:400;"><a href="https://diycyberguy.com/" target="_blank" rel="noreferrer noopener">DIY cyber guy  </a></span><span style="font-weight:400;">about the cloud computing career paths </span></p>
<p> </p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Guest: David W. Schropfer
Guest Title: Host of DIY Cyber Guy Podcast
Abstract: 
Many IT & security professionals are asking what Is the best way to enter the world of cloud computing. In this episode we continue our conversation with David W. Schropfer from DIY cyber guy  about the cloud computing career paths 
 ]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[SilverLining Episode 44: Gaining cloud security knowledge & certification - Part 2]]>
                </itunes:title>
                                    <itunes:episode>44</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<h4>Guest<strong>:</strong> <a href="https://diycyberguy.com/">David W. Schropfer</a></h4>
<h4>Guest Title: Host of DIY <a href="https://diycyberguy.com/" target="_blank" rel="noreferrer noopener">Cyber Guy</a> Podcast</h4>
<h4>Abstract: </h4>
<p>Many IT &amp; security professionals are asking what Is the best way to enter the world of cloud computing. <span style="font-weight:400;">In this episode we continue our conversation with David</span><a href="https://diycyberguy.com/"><span style="font-weight:400;"> W. Schropfer</span></a><span style="font-weight:400;"> from </span><span style="font-weight:400;"><a href="https://diycyberguy.com/" target="_blank" rel="noreferrer noopener">DIY cyber guy  </a></span><span style="font-weight:400;">about the cloud computing career paths </span></p>
<p> </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/5725/4d76390e-54cb-4a7b-9e01-3e9f3e43d520/silver-lining-44.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fsilverlining-episode-44-gaining-cloud-security-knowledge-certification-part-2&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fsilverlining-episode-44-gaining-cloud-security-knowledge-certification-part-2&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=d51efe889f46eee6a39aeb9f75b2ad36197961fac8a7c559bb26cae71af545bb" length="62078508"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Guest: David W. Schropfer
Guest Title: Host of DIY Cyber Guy Podcast
Abstract: 
Many IT & security professionals are asking what Is the best way to enter the world of cloud computing. In this episode we continue our conversation with David W. Schropfer from DIY cyber guy  about the cloud computing career paths 
 ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/EP44-SilveeLining.JPG"></itunes:image>
                                                                            <itunes:duration>00:25:51</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[SilverLining Episode 43: Gaining cloud security knowledge & certification]]>
                </title>
                <pubDate>Wed, 08 Dec 2021 06:00:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/silverlining-episode-43-gaining-cloud-security-knowledge-certification</guid>
                                    <link>https://silverlining-il.castos.com/episodes/silverlining-episode-43-gaining-cloud-security-knowledge-certification</link>
                                <description>
                                            <![CDATA[<h4>Guest<strong>:</strong> <a href="https://diycyberguy.com/">David W. Schropfer</a></h4>
<h4>Guest Title: Host of DIY <a href="https://diycyberguy.com/" target="_blank" rel="noreferrer noopener">Cyber Guy</a> Podcast</h4>
<h4>Abstract: </h4>
<p>Many IT &amp; security professionals are asking what Is the best way to enter the world of cloud computing. In this episode we had the privilege of cooperating with David<a href="https://diycyberguy.com/" target="_blank" rel="noreferrer noopener"> W. Schropfer</a> from the successful podcast DIY<a href="https://diycyberguy.com/" target="_blank" rel="noreferrer noopener"> cyber guy</a> to discuss the career paths that are relevant for beginners or experienced professionals who wish to explore how cloud computing can promote their career.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Guest: David W. Schropfer
Guest Title: Host of DIY Cyber Guy Podcast
Abstract: 
Many IT & security professionals are asking what Is the best way to enter the world of cloud computing. In this episode we had the privilege of cooperating with David W. Schropfer from the successful podcast DIY cyber guy to discuss the career paths that are relevant for beginners or experienced professionals who wish to explore how cloud computing can promote their career.]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[SilverLining Episode 43: Gaining cloud security knowledge & certification]]>
                </itunes:title>
                                    <itunes:episode>43</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<h4>Guest<strong>:</strong> <a href="https://diycyberguy.com/">David W. Schropfer</a></h4>
<h4>Guest Title: Host of DIY <a href="https://diycyberguy.com/" target="_blank" rel="noreferrer noopener">Cyber Guy</a> Podcast</h4>
<h4>Abstract: </h4>
<p>Many IT &amp; security professionals are asking what Is the best way to enter the world of cloud computing. In this episode we had the privilege of cooperating with David<a href="https://diycyberguy.com/" target="_blank" rel="noreferrer noopener"> W. Schropfer</a> from the successful podcast DIY<a href="https://diycyberguy.com/" target="_blank" rel="noreferrer noopener"> cyber guy</a> to discuss the career paths that are relevant for beginners or experienced professionals who wish to explore how cloud computing can promote their career.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/5725/65f09177-d0d2-46ad-82b8-ab199091722a/SilverLining-43.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fsilverlining-episode-43-gaining-cloud-security-knowledge-certification&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fsilverlining-episode-43-gaining-cloud-security-knowledge-certification&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=2fa22c7d8d035c1edde1c453e43c3877f20c4a602a3b3eb6f0cf3efd68b737de" length="60173868"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Guest: David W. Schropfer
Guest Title: Host of DIY Cyber Guy Podcast
Abstract: 
Many IT & security professionals are asking what Is the best way to enter the world of cloud computing. In this episode we had the privilege of cooperating with David W. Schropfer from the successful podcast DIY cyber guy to discuss the career paths that are relevant for beginners or experienced professionals who wish to explore how cloud computing can promote their career.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/EP43-SilveeLining.v1.cropped.jpg"></itunes:image>
                                                                            <itunes:duration>00:25:04</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[SilverLining Episode 42: How to mature devsecops operations]]>
                </title>
                <pubDate>Wed, 06 Oct 2021 08:00:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/silverlining-episode-42-how-to-mature-devsecops-operations</guid>
                                    <link>https://silverlining-il.castos.com/episodes/silverlining-episode-42-how-to-mature-devsecops-operations</link>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;"><strong>Guest:</strong> Hemi Gur-Ary </span></p>
<p><strong>Guest Title:</strong><span style="font-weight:400;"> Co-Founder &amp; CEO at VATA</span></p>
<p><strong>Abstract: </strong></p>
<p><span style="font-weight:400;">Various organizations around the world are struggling to build &amp; mature their devsecops operations. DSOM (Devsecops Maturity Model) is an OWASP project designed to help organizations plan and prioritize their devsecops strategies. In this episode, Hemi Gur-Ary, co-founder at VATA and senior devsecops consultant, shares his insights about DSOM and how organizations can use it for reshaping their devsecops practices.</span></p>
<p> </p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Guest: Hemi Gur-Ary 
Guest Title: Co-Founder & CEO at VATA
Abstract: 
Various organizations around the world are struggling to build & mature their devsecops operations. DSOM (Devsecops Maturity Model) is an OWASP project designed to help organizations plan and prioritize their devsecops strategies. In this episode, Hemi Gur-Ary, co-founder at VATA and senior devsecops consultant, shares his insights about DSOM and how organizations can use it for reshaping their devsecops practices.
 ]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[SilverLining Episode 42: How to mature devsecops operations]]>
                </itunes:title>
                                    <itunes:episode>42</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;"><strong>Guest:</strong> Hemi Gur-Ary </span></p>
<p><strong>Guest Title:</strong><span style="font-weight:400;"> Co-Founder &amp; CEO at VATA</span></p>
<p><strong>Abstract: </strong></p>
<p><span style="font-weight:400;">Various organizations around the world are struggling to build &amp; mature their devsecops operations. DSOM (Devsecops Maturity Model) is an OWASP project designed to help organizations plan and prioritize their devsecops strategies. In this episode, Hemi Gur-Ary, co-founder at VATA and senior devsecops consultant, shares his insights about DSOM and how organizations can use it for reshaping their devsecops practices.</span></p>
<p> </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/5725%2Fbd02eeb2-bfa7-4b7d-9651-10cfbdb52042%2FEP42-Silvelining-Final.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fsilverlining-episode-42-how-to-mature-devsecops-operations&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fsilverlining-episode-42-how-to-mature-devsecops-operations&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=13513376cfd4fc874ea03bedec54df143f8ada3824bbf742f7dacf37ae442d6c" length="47534508"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Guest: Hemi Gur-Ary 
Guest Title: Co-Founder & CEO at VATA
Abstract: 
Various organizations around the world are struggling to build & mature their devsecops operations. DSOM (Devsecops Maturity Model) is an OWASP project designed to help organizations plan and prioritize their devsecops strategies. In this episode, Hemi Gur-Ary, co-founder at VATA and senior devsecops consultant, shares his insights about DSOM and how organizations can use it for reshaping their devsecops practices.
 ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/EP42-Photo-Silverlining.JPG"></itunes:image>
                                                                            <itunes:duration>00:19:48</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[SilverLining Episode 41: Securing ci/cd pipeline using policy as code]]>
                </title>
                <pubDate>Wed, 25 Aug 2021 08:33:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/silverlining-episode-41-securing-cicd-pipeline-using-policy-as-code</guid>
                                    <link>https://silverlining-il.castos.com/episodes/silverlining-episode-41-securing-cicd-pipeline-using-policy-as-code</link>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;"><strong>Guest: </strong></span><span style="font-weight:400;">Eran Leib (vp product), Maor Goldberg (CEO)</span></p>
<p><span style="font-weight:400;"><strong>Guest Title:</strong>  Founders at Apolicy (a sysdig company)</span></p>
<p><strong>Abstract: </strong><span style="font-weight:400;">Infrastructure and policy as code is one of the hottest topics in security today. In this episode we spoke with Eran &amp; Maor, founders at aPolicy (acquired by Sysdig shortly after the recording) ,  about cloud native security and how organizations should use automated policy templates for security CI/CD pipelines.</span></p>
<p> </p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Guest: Eran Leib (vp product), Maor Goldberg (CEO)
Guest Title:  Founders at Apolicy (a sysdig company)
Abstract: Infrastructure and policy as code is one of the hottest topics in security today. In this episode we spoke with Eran & Maor, founders at aPolicy (acquired by Sysdig shortly after the recording) ,  about cloud native security and how organizations should use automated policy templates for security CI/CD pipelines.
 ]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[SilverLining Episode 41: Securing ci/cd pipeline using policy as code]]>
                </itunes:title>
                                    <itunes:episode>41</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;"><strong>Guest: </strong></span><span style="font-weight:400;">Eran Leib (vp product), Maor Goldberg (CEO)</span></p>
<p><span style="font-weight:400;"><strong>Guest Title:</strong>  Founders at Apolicy (a sysdig company)</span></p>
<p><strong>Abstract: </strong><span style="font-weight:400;">Infrastructure and policy as code is one of the hottest topics in security today. In this episode we spoke with Eran &amp; Maor, founders at aPolicy (acquired by Sysdig shortly after the recording) ,  about cloud native security and how organizations should use automated policy templates for security CI/CD pipelines.</span></p>
<p> </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/silver-lining-41-Final.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fsilverlining-episode-41-securing-cicd-pipeline-using-policy-as-code&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fsilverlining-episode-41-securing-cicd-pipeline-using-policy-as-code&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=8a7bf98b0000876ca71a2ea70c1e553d59cb932d010a4143df6ccd5869e162be" length="96090347"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Guest: Eran Leib (vp product), Maor Goldberg (CEO)
Guest Title:  Founders at Apolicy (a sysdig company)
Abstract: Infrastructure and policy as code is one of the hottest topics in security today. In this episode we spoke with Eran & Maor, founders at aPolicy (acquired by Sysdig shortly after the recording) ,  about cloud native security and how organizations should use automated policy templates for security CI/CD pipelines.
 ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/EP41-Silverlining-Castos.jpg"></itunes:image>
                                                                            <itunes:duration>00:40:02</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[SilverLining Episode 40: Protecting SaaS services using automation & continuous monitoring]]>
                </title>
                <pubDate>Wed, 21 Jul 2021 08:00:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/silverlining-episode-40-protecting-saas-services-using-automation-continuous-monitoring-1</guid>
                                    <link>https://silverlining-il.castos.com/episodes/silverlining-episode-40-protecting-saas-services-using-automation-continuous-monitoring-1</link>
                                <description>
                                            <![CDATA[<p><span style="font-weight:400;"><strong>Guest:</strong> Adam Gavish</span></p>
<p><span style="font-weight:400;"><strong>Guest Title:</strong> </span><span style="font-weight:400;">Co-Founder and CEO, D</span><span style="font-weight:400;">oControl.io</span></p>
<p><strong>Topic: </strong><span style="font-weight:400;">Protecting SaaS services using automation &amp; continuous monitoring</span></p>
<p><strong>Abstract: <span style="font-weight:400;">SaaS services are blooming and organizations are adopting more and more of them. In this episode, we hosted Adam Gavish, co-founder, and CEO at DoControl - an innovative startup that is reshaping the way we govern and monitor SaaS applications -  about the business case of SaaS services, the market gaps, and how organizations should catalog, protect and monitor their SaaS portfolio.</span></strong></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Guest: Adam Gavish
Guest Title: Co-Founder and CEO, DoControl.io
Topic: Protecting SaaS services using automation & continuous monitoring
Abstract: SaaS services are blooming and organizations are adopting more and more of them. In this episode, we hosted Adam Gavish, co-founder, and CEO at DoControl - an innovative startup that is reshaping the way we govern and monitor SaaS applications -  about the business case of SaaS services, the market gaps, and how organizations should catalog, protect and monitor their SaaS portfolio.]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[SilverLining Episode 40: Protecting SaaS services using automation & continuous monitoring]]>
                </itunes:title>
                                    <itunes:episode>40</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><span style="font-weight:400;"><strong>Guest:</strong> Adam Gavish</span></p>
<p><span style="font-weight:400;"><strong>Guest Title:</strong> </span><span style="font-weight:400;">Co-Founder and CEO, D</span><span style="font-weight:400;">oControl.io</span></p>
<p><strong>Topic: </strong><span style="font-weight:400;">Protecting SaaS services using automation &amp; continuous monitoring</span></p>
<p><strong>Abstract: <span style="font-weight:400;">SaaS services are blooming and organizations are adopting more and more of them. In this episode, we hosted Adam Gavish, co-founder, and CEO at DoControl - an innovative startup that is reshaping the way we govern and monitor SaaS applications -  about the business case of SaaS services, the market gaps, and how organizations should catalog, protect and monitor their SaaS portfolio.</span></strong></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/silver-lining-40-Final.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fsilverlining-episode-40-protecting-saas-services-using-automation-continuous-monitoring-1&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fsilverlining-episode-40-protecting-saas-services-using-automation-continuous-monitoring-1&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=8782e9ba34d7d2c9df36d397e41eda09562beb59b9ccc0ab84c390ff16f67c27" length="55043368"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Guest: Adam Gavish
Guest Title: Co-Founder and CEO, DoControl.io
Topic: Protecting SaaS services using automation & continuous monitoring
Abstract: SaaS services are blooming and organizations are adopting more and more of them. In this episode, we hosted Adam Gavish, co-founder, and CEO at DoControl - an innovative startup that is reshaping the way we govern and monitor SaaS applications -  about the business case of SaaS services, the market gaps, and how organizations should catalog, protect and monitor their SaaS portfolio.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/SilverLining-EP40-Updated.jpg"></itunes:image>
                                                                            <itunes:duration>00:22:55</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[SilverLining Episode 39: Securing API Services]]>
                </title>
                <pubDate>Wed, 23 Jun 2021 08:00:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/silverlining-episode-39-securing-api-services</guid>
                                    <link>https://silverlining-il.castos.com/episodes/silverlining-episode-39-securing-api-services</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Oz Avenstein </span></p>
<p><span style="font-weight:400;">Guest Title:</span><span style="font-weight:400;"> Founder &amp; CEO @ Avensec - Cloud &amp; Application Security</span></p>
<p><span style="font-weight:400;">Topic:</span><span style="font-weight:400;"> Securing API Services</span></p>
<p> </p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">The applicative infrastructure is becoming more and more complex due to different requirements, design patterns, and technologies. In many of these cases, one of those requirements is to connect other parties to systems, and in other cases, to connect systems to other parties. Nowadays, the most common connection method is to use Application Programming Interfaces (APIs). In this episode we spoke with Oz Avenstein, co-author of the CSA </span><a href="https://cloudsecurityalliance.org/artifacts/security-guidelines-for-providing-and-consuming-apis/" target="_blank" rel="noreferrer noopener"><span style="font-weight:400;">Security Guidelines for Providing and Consuming APIs</span></a> <span style="font-weight:400;">about the guidelines creation process and how organizations should secure access to API resources. </span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Oz Avenstein 
Guest Title: Founder & CEO @ Avensec - Cloud & Application Security
Topic: Securing API Services
 
Abstract
The applicative infrastructure is becoming more and more complex due to different requirements, design patterns, and technologies. In many of these cases, one of those requirements is to connect other parties to systems, and in other cases, to connect systems to other parties. Nowadays, the most common connection method is to use Application Programming Interfaces (APIs). In this episode we spoke with Oz Avenstein, co-author of the CSA Security Guidelines for Providing and Consuming APIs about the guidelines creation process and how organizations should secure access to API resources. ]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[SilverLining Episode 39: Securing API Services]]>
                </itunes:title>
                                    <itunes:episode>39</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Oz Avenstein </span></p>
<p><span style="font-weight:400;">Guest Title:</span><span style="font-weight:400;"> Founder &amp; CEO @ Avensec - Cloud &amp; Application Security</span></p>
<p><span style="font-weight:400;">Topic:</span><span style="font-weight:400;"> Securing API Services</span></p>
<p> </p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">The applicative infrastructure is becoming more and more complex due to different requirements, design patterns, and technologies. In many of these cases, one of those requirements is to connect other parties to systems, and in other cases, to connect systems to other parties. Nowadays, the most common connection method is to use Application Programming Interfaces (APIs). In this episode we spoke with Oz Avenstein, co-author of the CSA </span><a href="https://cloudsecurityalliance.org/artifacts/security-guidelines-for-providing-and-consuming-apis/" target="_blank" rel="noreferrer noopener"><span style="font-weight:400;">Security Guidelines for Providing and Consuming APIs</span></a> <span style="font-weight:400;">about the guidelines creation process and how organizations should secure access to API resources. </span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/silver-lining-39.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fsilverlining-episode-39-securing-api-services&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fsilverlining-episode-39-securing-api-services&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=94ccd3adb281e583e430a452446416ecdbb096484423a9118e8f004940dfebd8" length="69940692"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Oz Avenstein 
Guest Title: Founder & CEO @ Avensec - Cloud & Application Security
Topic: Securing API Services
 
Abstract
The applicative infrastructure is becoming more and more complex due to different requirements, design patterns, and technologies. In many of these cases, one of those requirements is to connect other parties to systems, and in other cases, to connect systems to other parties. Nowadays, the most common connection method is to use Application Programming Interfaces (APIs). In this episode we spoke with Oz Avenstein, co-author of the CSA Security Guidelines for Providing and Consuming APIs about the guidelines creation process and how organizations should secure access to API resources. ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/silver-lining-39-Photo.jpg"></itunes:image>
                                                                            <itunes:duration>00:29:08</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[SilverLining Episode 38: Cloud Native Security Foundations]]>
                </title>
                <pubDate>Wed, 12 May 2021 07:00:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/silverlining-episode-38-cloud-native-security-foundations</guid>
                                    <link>https://silverlining-il.castos.com/episodes/silverlining-episode-38-cloud-native-security-foundations</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Gadi Naor </span></p>
<p><span style="font-weight:400;">Guest Title:</span><span style="font-weight:400;"> VP Software Engineering, Cloud Security @ Rapid7</span></p>
<p><span style="font-weight:400;">Topic:</span><span style="font-weight:400;"> Cloud Native Security Foundations</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Lately, The CNCF (Cloud Native Computing Foundation) released the </span><a href="https://www.cncf.io/blog/2020/11/18/announcing-the-cloud-native-security-white-paper/"><span style="font-weight:400;">cloud native security whitepaper</span></a><span style="font-weight:400;">: the first release of security guidelines for organizations who adopt cloud native approaches. In order to better understand the guidelines, we hosted Gadi Naor, VP Software Engineering, Cloud Security @ Rapid7, and co-author of the guidelines, for a conversation about what is cloud native security and why &amp; how organizations should adopt this approach.</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Gadi Naor 
Guest Title: VP Software Engineering, Cloud Security @ Rapid7
Topic: Cloud Native Security Foundations
Abstract
Lately, The CNCF (Cloud Native Computing Foundation) released the cloud native security whitepaper: the first release of security guidelines for organizations who adopt cloud native approaches. In order to better understand the guidelines, we hosted Gadi Naor, VP Software Engineering, Cloud Security @ Rapid7, and co-author of the guidelines, for a conversation about what is cloud native security and why & how organizations should adopt this approach.]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[SilverLining Episode 38: Cloud Native Security Foundations]]>
                </itunes:title>
                                    <itunes:episode>38</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Gadi Naor </span></p>
<p><span style="font-weight:400;">Guest Title:</span><span style="font-weight:400;"> VP Software Engineering, Cloud Security @ Rapid7</span></p>
<p><span style="font-weight:400;">Topic:</span><span style="font-weight:400;"> Cloud Native Security Foundations</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Lately, The CNCF (Cloud Native Computing Foundation) released the </span><a href="https://www.cncf.io/blog/2020/11/18/announcing-the-cloud-native-security-white-paper/"><span style="font-weight:400;">cloud native security whitepaper</span></a><span style="font-weight:400;">: the first release of security guidelines for organizations who adopt cloud native approaches. In order to better understand the guidelines, we hosted Gadi Naor, VP Software Engineering, Cloud Security @ Rapid7, and co-author of the guidelines, for a conversation about what is cloud native security and why &amp; how organizations should adopt this approach.</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/%D7%A4%D7%95%D7%93%D7%A7%D7%90%D7%A1%D7%98-%D7%92%D7%93%D7%99-24-2-21.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fsilverlining-episode-38-cloud-native-security-foundations&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fsilverlining-episode-38-cloud-native-security-foundations&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=a833eb3e3b8c0948ecfa76967fd0adc3170f9c29a1fb4db6d9f67384acd5c457" length="62844605"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Gadi Naor 
Guest Title: VP Software Engineering, Cloud Security @ Rapid7
Topic: Cloud Native Security Foundations
Abstract
Lately, The CNCF (Cloud Native Computing Foundation) released the cloud native security whitepaper: the first release of security guidelines for organizations who adopt cloud native approaches. In order to better understand the guidelines, we hosted Gadi Naor, VP Software Engineering, Cloud Security @ Rapid7, and co-author of the guidelines, for a conversation about what is cloud native security and why & how organizations should adopt this approach.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/Silverlining-Castos.jpg"></itunes:image>
                                                                            <itunes:duration>00:32:43</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[SilverLining Episode 37: Software Package Dependencies Attacks ]]>
                </title>
                <pubDate>Tue, 13 Apr 2021 20:00:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/silverlining-episode-37-software-package-dependencies-attacks</guid>
                                    <link>https://silverlining-il.castos.com/episodes/silverlining-episode-37-software-package-dependencies-attacks</link>
                                <description>
                                            <![CDATA[<h4>Attendees</h4>
<p>Guest: Tzachi Zornstain</p>
<p>Guest Title: Co-Founder &amp; CEO, Dustico</p>
<p>Topic: Software Package Dependencies Attacks</p>
<h4>Abstract</h4>
<p>Supply chain and software dependencies attacks are becoming more popular, and organizations are having a hard time coping with those types of vectors. In this episode, we spoke with Tzach Zornstain, Co-Founder at Dustico, about the difference between malicious software and vulnerable software, and how organizations should use 3rd party software for the development of their own applications securely.</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Tzachi Zornstain
Guest Title: Co-Founder & CEO, Dustico
Topic: Software Package Dependencies Attacks
Abstract
Supply chain and software dependencies attacks are becoming more popular, and organizations are having a hard time coping with those types of vectors. In this episode, we spoke with Tzach Zornstain, Co-Founder at Dustico, about the difference between malicious software and vulnerable software, and how organizations should use 3rd party software for the development of their own applications securely.]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[SilverLining Episode 37: Software Package Dependencies Attacks ]]>
                </itunes:title>
                                    <itunes:episode>37</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<h4>Attendees</h4>
<p>Guest: Tzachi Zornstain</p>
<p>Guest Title: Co-Founder &amp; CEO, Dustico</p>
<p>Topic: Software Package Dependencies Attacks</p>
<h4>Abstract</h4>
<p>Supply chain and software dependencies attacks are becoming more popular, and organizations are having a hard time coping with those types of vectors. In this episode, we spoke with Tzach Zornstain, Co-Founder at Dustico, about the difference between malicious software and vulnerable software, and how organizations should use 3rd party software for the development of their own applications securely.</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/%D7%A4%D7%95%D7%93%D7%A7%D7%90%D7%A1%D7%98-%D7%A6%D7%97%D7%99.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fsilverlining-episode-37-software-package-dependencies-attacks&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fsilverlining-episode-37-software-package-dependencies-attacks&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=05ad0c051830fd671f7139f2c2ed1a4d644f357aa90b09ba2f14d0f8ad9ebfc2" length="65462976"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Tzachi Zornstain
Guest Title: Co-Founder & CEO, Dustico
Topic: Software Package Dependencies Attacks
Abstract
Supply chain and software dependencies attacks are becoming more popular, and organizations are having a hard time coping with those types of vectors. In this episode, we spoke with Tzach Zornstain, Co-Founder at Dustico, about the difference between malicious software and vulnerable software, and how organizations should use 3rd party software for the development of their own applications securely.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/CASTOS.jpg"></itunes:image>
                                                                            <itunes:duration>00:27:16</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 36: Wiz]]>
                </title>
                <pubDate>Tue, 09 Mar 2021 20:00:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-36-wiz</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-36-wiz</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest:</span> <a href="mailto:yinon@wiz.io" target="_blank" rel="noreferrer noopener"><span style="font-weight:400;">Yinon Costica</span></a></p>
<p><span style="font-weight:400;">Guest title:</span><span style="font-weight:400;"> VP Product </span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Wiz is the new star in the cloud security market, founded by veterans with a proven record and raised over $100M in less than a year of operations. In this episode, we talked with </span><span style="font-weight:400;"><a href="mailto:yinon@wiz.io" target="_blank" rel="noreferrer noopener">Yinon Costica</a></span><span style="font-weight:400;">, Co-Founder and VP Product at Wiz, about cloud security challenges, how is Wiz different from others, and how are they going to disrupt the market. </span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Yinon Costica
Guest title: VP Product 
Abstract
Wiz is the new star in the cloud security market, founded by veterans with a proven record and raised over $100M in less than a year of operations. In this episode, we talked with Yinon Costica, Co-Founder and VP Product at Wiz, about cloud security challenges, how is Wiz different from others, and how are they going to disrupt the market. ]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 36: Wiz]]>
                </itunes:title>
                                    <itunes:episode>36</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest:</span> <a href="mailto:yinon@wiz.io" target="_blank" rel="noreferrer noopener"><span style="font-weight:400;">Yinon Costica</span></a></p>
<p><span style="font-weight:400;">Guest title:</span><span style="font-weight:400;"> VP Product </span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Wiz is the new star in the cloud security market, founded by veterans with a proven record and raised over $100M in less than a year of operations. In this episode, we talked with </span><span style="font-weight:400;"><a href="mailto:yinon@wiz.io" target="_blank" rel="noreferrer noopener">Yinon Costica</a></span><span style="font-weight:400;">, Co-Founder and VP Product at Wiz, about cloud security challenges, how is Wiz different from others, and how are they going to disrupt the market. </span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/%D7%A4%D7%95%D7%93%D7%A7%D7%90%D7%A1%D7%98-%D7%99%D7%A0%D7%95%D7%9F.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-36-wiz&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-36-wiz&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=d5906218a3335d2e9f1ef24d99aa622ef5d3c9d68e0af33519f9a988e578c30a" length="73796184"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Yinon Costica
Guest title: VP Product 
Abstract
Wiz is the new star in the cloud security market, founded by veterans with a proven record and raised over $100M in less than a year of operations. In this episode, we talked with Yinon Costica, Co-Founder and VP Product at Wiz, about cloud security challenges, how is Wiz different from others, and how are they going to disrupt the market. ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/PXL-20210224-100428992.jpg"></itunes:image>
                                                                            <itunes:duration>00:30:44</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 35: Compliance Automation and Zero Trust Containers]]>
                </title>
                <pubDate>Wed, 24 Feb 2021 07:53:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-35-compliance-automation-and-zero-trust-containers</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-35-compliance-automation-and-zero-trust-containers</link>
                                <description>
                                            <![CDATA[<h3><strong>Sponsored By:</strong></h3>
<h4> <img src="http://techtalk.co.il/wp-content/uploads/2021/02/ibm_PNG19656-2.png" alt="" width="190" height="76" /></h4>
<h4>‍‍</h4>
<h3><strong>Attendees<br /></strong></h3>
<h4><span style="font-weight:400;">Guest: </span><span style="font-weight:400;">Malgorzata (Gosia) Steinder<br /></span><span style="font-weight:400;">Guest title:</span><span style="font-weight:400;"> CTO of Hybrid Cloud Research. IBM research<br /></span><span style="font-weight:400;">Topic: </span><span style="font-weight:400;">Compliance automation and zero trust containers</span></h4>
<p> </p>
<h3><strong>Abstract</strong></h3>
<p><span style="font-weight:400;">Continuous monitoring, containers, zero trust, confidential computing - those are all examples of technologies that will be the main focus in the upcoming years. In this episode, we hosted Malgorzata (Gosia) Steinder, CTO of Hybrid Cloud Research at IBM, who provided her vision on how all those technologies mentioned above, should be integrated into highly secure applications deployments.</span></p>
<p> </p>
<h3><strong>Links: </strong></h3>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">NIST OSCAL standard: </span><a href="https://pages.nist.gov/OSCAL/"><span style="font-weight:400;">https://pages.nist.gov/OSCAL/</span></a></li>
<li style="font-weight:400;"><span style="font-weight:400;">Automated compliance Open Source tool  by IBM  </span><a href="https://github.com/IBM/compliance-trestle"><span style="font-weight:400;">https://github.com/IBM/compliance-trestle</span></a></li>
<li style="font-weight:400;"><span style="font-weight:400;">Security monitoring open source tool by IBM:  </span><a href="https://www.ibm.com/blogs/research/2020/01/sysflow/"><span style="font-weight:400;">https://www.ibm.com/blogs/research/2020/01/sysflow/</span></a></li>
<li style="font-weight:400;"><span style="font-weight:400;">workload identity: </span><a href="https://developer.ibm.com/solutions/security/articles/protecting-data-using-secret-management-trusted-service-identity/"><span style="font-weight:400;">https://developer.ibm.com/solutions/security/articles/protecting-data-using-secret-management-trusted-service-identity/</span></a></li>
</ul>
<p> </p>
<p> </p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Sponsored By:
 
‍‍
Attendees
Guest: Malgorzata (Gosia) SteinderGuest title: CTO of Hybrid Cloud Research. IBM researchTopic: Compliance automation and zero trust containers
 
Abstract
Continuous monitoring, containers, zero trust, confidential computing - those are all examples of technologies that will be the main focus in the upcoming years. In this episode, we hosted Malgorzata (Gosia) Steinder, CTO of Hybrid Cloud Research at IBM, who provided her vision on how all those technologies mentioned above, should be integrated into highly secure applications deployments.
 
Links: 

NIST OSCAL standard: https://pages.nist.gov/OSCAL/
Automated compliance Open Source tool  by IBM  https://github.com/IBM/compliance-trestle
Security monitoring open source tool by IBM:  https://www.ibm.com/blogs/research/2020/01/sysflow/
workload identity: https://developer.ibm.com/solutions/security/articles/protecting-data-using-secret-management-trusted-service-identity/

 
 ]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 35: Compliance Automation and Zero Trust Containers]]>
                </itunes:title>
                                    <itunes:episode>35</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<h3><strong>Sponsored By:</strong></h3>
<h4> <img src="http://techtalk.co.il/wp-content/uploads/2021/02/ibm_PNG19656-2.png" alt="" width="190" height="76" /></h4>
<h4>‍‍</h4>
<h3><strong>Attendees<br /></strong></h3>
<h4><span style="font-weight:400;">Guest: </span><span style="font-weight:400;">Malgorzata (Gosia) Steinder<br /></span><span style="font-weight:400;">Guest title:</span><span style="font-weight:400;"> CTO of Hybrid Cloud Research. IBM research<br /></span><span style="font-weight:400;">Topic: </span><span style="font-weight:400;">Compliance automation and zero trust containers</span></h4>
<p> </p>
<h3><strong>Abstract</strong></h3>
<p><span style="font-weight:400;">Continuous monitoring, containers, zero trust, confidential computing - those are all examples of technologies that will be the main focus in the upcoming years. In this episode, we hosted Malgorzata (Gosia) Steinder, CTO of Hybrid Cloud Research at IBM, who provided her vision on how all those technologies mentioned above, should be integrated into highly secure applications deployments.</span></p>
<p> </p>
<h3><strong>Links: </strong></h3>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">NIST OSCAL standard: </span><a href="https://pages.nist.gov/OSCAL/"><span style="font-weight:400;">https://pages.nist.gov/OSCAL/</span></a></li>
<li style="font-weight:400;"><span style="font-weight:400;">Automated compliance Open Source tool  by IBM  </span><a href="https://github.com/IBM/compliance-trestle"><span style="font-weight:400;">https://github.com/IBM/compliance-trestle</span></a></li>
<li style="font-weight:400;"><span style="font-weight:400;">Security monitoring open source tool by IBM:  </span><a href="https://www.ibm.com/blogs/research/2020/01/sysflow/"><span style="font-weight:400;">https://www.ibm.com/blogs/research/2020/01/sysflow/</span></a></li>
<li style="font-weight:400;"><span style="font-weight:400;">workload identity: </span><a href="https://developer.ibm.com/solutions/security/articles/protecting-data-using-secret-management-trusted-service-identity/"><span style="font-weight:400;">https://developer.ibm.com/solutions/security/articles/protecting-data-using-secret-management-trusted-service-identity/</span></a></li>
</ul>
<p> </p>
<p> </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/EP35-IBM-Final.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-35-compliance-automation-and-zero-trust-containers&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-35-compliance-automation-and-zero-trust-containers&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=d3f53ce22e1333b3e2c1257262dc7ac0385ffbb354cdd9c21b34947dc2a1f6c7" length="63541830"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Sponsored By:
 
‍‍
Attendees
Guest: Malgorzata (Gosia) SteinderGuest title: CTO of Hybrid Cloud Research. IBM researchTopic: Compliance automation and zero trust containers
 
Abstract
Continuous monitoring, containers, zero trust, confidential computing - those are all examples of technologies that will be the main focus in the upcoming years. In this episode, we hosted Malgorzata (Gosia) Steinder, CTO of Hybrid Cloud Research at IBM, who provided her vision on how all those technologies mentioned above, should be integrated into highly secure applications deployments.
 
Links: 

NIST OSCAL standard: https://pages.nist.gov/OSCAL/
Automated compliance Open Source tool  by IBM  https://github.com/IBM/compliance-trestle
Security monitoring open source tool by IBM:  https://www.ibm.com/blogs/research/2020/01/sysflow/
workload identity: https://developer.ibm.com/solutions/security/articles/protecting-data-using-secret-management-trusted-service-identity/

 
 ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/EP35-IBM-S.jpg"></itunes:image>
                                                                            <itunes:duration>00:33:05</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 34: PayPal cloud journey ]]>
                </title>
                <pubDate>Mon, 08 Feb 2021 10:20:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-34-paypal-cloud-journey</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-34-paypal-cloud-journey</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest:</span><span style="font-weight:400;"> Assaf Keren</span></p>
<p><span style="font-weight:400;">Guest Title: VP, Enterprise Cyber Security</span></p>
<p><span style="font-weight:400;">Company: PayPal </span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">PayPal is one of the most interesting organizations in the world in terms of security. The combination of online presence with the unique line of business is making PayPal one of the most secure hi-tech companies and one of the most innovative financial institutions. </span></p>
<p><span style="font-weight:400;">In this episode, we hosted Assaf Keren, VP of enterprise cyber security, for a discussion about PayPal’s cloud journey from traditional on-premise to the multi-cloud / multi-locations giant they are now, and how COVID-19 is changing Paypal’s digital journey with their customers &amp; employees.</span></p>
<p> </p>
<p> </p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Assaf Keren
Guest Title: VP, Enterprise Cyber Security
Company: PayPal 
Abstract
PayPal is one of the most interesting organizations in the world in terms of security. The combination of online presence with the unique line of business is making PayPal one of the most secure hi-tech companies and one of the most innovative financial institutions. 
In this episode, we hosted Assaf Keren, VP of enterprise cyber security, for a discussion about PayPal’s cloud journey from traditional on-premise to the multi-cloud / multi-locations giant they are now, and how COVID-19 is changing Paypal’s digital journey with their customers & employees.
 
 ]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 34: PayPal cloud journey ]]>
                </itunes:title>
                                    <itunes:episode>34</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest:</span><span style="font-weight:400;"> Assaf Keren</span></p>
<p><span style="font-weight:400;">Guest Title: VP, Enterprise Cyber Security</span></p>
<p><span style="font-weight:400;">Company: PayPal </span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">PayPal is one of the most interesting organizations in the world in terms of security. The combination of online presence with the unique line of business is making PayPal one of the most secure hi-tech companies and one of the most innovative financial institutions. </span></p>
<p><span style="font-weight:400;">In this episode, we hosted Assaf Keren, VP of enterprise cyber security, for a discussion about PayPal’s cloud journey from traditional on-premise to the multi-cloud / multi-locations giant they are now, and how COVID-19 is changing Paypal’s digital journey with their customers &amp; employees.</span></p>
<p> </p>
<p> </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/silver-lining-34.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-34-paypal-cloud-journey&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-34-paypal-cloud-journey&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=778623dfd2624af93028fb62c1f0e2a254d6d215ddfd5dab51a6f7b1d86fa0e7" length="117701604"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Assaf Keren
Guest Title: VP, Enterprise Cyber Security
Company: PayPal 
Abstract
PayPal is one of the most interesting organizations in the world in terms of security. The combination of online presence with the unique line of business is making PayPal one of the most secure hi-tech companies and one of the most innovative financial institutions. 
In this episode, we hosted Assaf Keren, VP of enterprise cyber security, for a discussion about PayPal’s cloud journey from traditional on-premise to the multi-cloud / multi-locations giant they are now, and how COVID-19 is changing Paypal’s digital journey with their customers & employees.
 
 ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/2.jpg"></itunes:image>
                                                                            <itunes:duration>00:49:02</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 33: Researching Cloud Vulnerabilities]]>
                </title>
                <pubDate>Mon, 18 Jan 2021 20:54:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-33-researching-cloud-vulnerabilities</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-33-researching-cloud-vulnerabilities</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest:</span><span style="font-weight:400;"> Asaf Hecht </span></p>
<p><span style="font-weight:400;">Guest Title: </span><span style="font-weight:400;">Security research team leader</span></p>
<p><span style="font-weight:400;">Company: </span><span style="font-weight:400;">CyberArk </span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">With the growth of cloud services, more knowledge is gathered on vulnerabilities and misconfigurations in cloud infrastructure. A great deal of this knowledge is coming from cloud security researchers. In this episode, we host Asaf Hecht, Security research team leader At Cyberark, for a conversation about cloud security research and the vulnerabilities they disclose are various cloud vendors. </span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Asaf Hecht 
Guest Title: Security research team leader
Company: CyberArk 
Abstract
With the growth of cloud services, more knowledge is gathered on vulnerabilities and misconfigurations in cloud infrastructure. A great deal of this knowledge is coming from cloud security researchers. In this episode, we host Asaf Hecht, Security research team leader At Cyberark, for a conversation about cloud security research and the vulnerabilities they disclose are various cloud vendors. ]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 33: Researching Cloud Vulnerabilities]]>
                </itunes:title>
                                    <itunes:episode>33</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest:</span><span style="font-weight:400;"> Asaf Hecht </span></p>
<p><span style="font-weight:400;">Guest Title: </span><span style="font-weight:400;">Security research team leader</span></p>
<p><span style="font-weight:400;">Company: </span><span style="font-weight:400;">CyberArk </span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">With the growth of cloud services, more knowledge is gathered on vulnerabilities and misconfigurations in cloud infrastructure. A great deal of this knowledge is coming from cloud security researchers. In this episode, we host Asaf Hecht, Security research team leader At Cyberark, for a conversation about cloud security research and the vulnerabilities they disclose are various cloud vendors. </span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/silverlining-podcast-33.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-33-researching-cloud-vulnerabilities&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-33-researching-cloud-vulnerabilities&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=933c5dbec81d376c14cde0ea70fa18c1ee2ea76c0dfb5322ec7b73b9ead354bf" length="75377844"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Asaf Hecht 
Guest Title: Security research team leader
Company: CyberArk 
Abstract
With the growth of cloud services, more knowledge is gathered on vulnerabilities and misconfigurations in cloud infrastructure. A great deal of this knowledge is coming from cloud security researchers. In this episode, we host Asaf Hecht, Security research team leader At Cyberark, for a conversation about cloud security research and the vulnerabilities they disclose are various cloud vendors. ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/IMG-20201222-110615.jpg"></itunes:image>
                                                                            <itunes:duration>00:31:24</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 32: Understanding Infrastructure as Code and How to Use it Effectively]]>
                </title>
                <pubDate>Tue, 05 Jan 2021 20:40:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-32-understanding-infrastructure-as-code-and-how-to-use-it-effectively</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-32-understanding-infrastructure-as-code-and-how-to-use-it-effectively</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: </span><span style="font-weight:400;">Ohad Maislish </span></p>
<p><span style="font-weight:400;">Guest Title: </span><strong>Co-Founder &amp; CEO </strong></p>
<p><span style="font-weight:400;">Company: </span><span style="font-weight:400;">env0</span></p>
<p><span style="font-weight:400;"><strong>Abstract</strong></span></p>
<p><span style="font-weight:400;">Infrastructure as code is one of the most interesting technologies in the market. It enables organizations to deploy heavy workloads within seconds and avoid risky configuration mistakes. In this episode, we talked with Ohad Maislish, Co-Founder and CEO at env0, about infrastructure as code technology, how and where it is being used, and how env0 helps organizations to better utilize this technology.</span></p>
<p><strong>Timing</strong></p>
<p><span style="font-weight:400;">0:00 introducing our guest</span></p>
<p><span style="font-weight:400;">2:26 What is infrastructure as a code</span></p>
<p><span style="font-weight:400;">10:16 Examples for practical deployment of IaaC</span></p>
<p><span style="font-weight:400;">13:55 How IaaC is helping governance </span></p>
<p><span style="font-weight:400;">19:20 IaaC behind the scenes</span></p>
<p><span style="font-weight:400;">25:18 IaaC in a multi-cloud environment</span></p>
<p><span style="font-weight:400;">28:40 Summary and last words</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Ohad Maislish 
Guest Title: Co-Founder & CEO 
Company: env0
Abstract
Infrastructure as code is one of the most interesting technologies in the market. It enables organizations to deploy heavy workloads within seconds and avoid risky configuration mistakes. In this episode, we talked with Ohad Maislish, Co-Founder and CEO at env0, about infrastructure as code technology, how and where it is being used, and how env0 helps organizations to better utilize this technology.
Timing
0:00 introducing our guest
2:26 What is infrastructure as a code
10:16 Examples for practical deployment of IaaC
13:55 How IaaC is helping governance 
19:20 IaaC behind the scenes
25:18 IaaC in a multi-cloud environment
28:40 Summary and last words]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 32: Understanding Infrastructure as Code and How to Use it Effectively]]>
                </itunes:title>
                                    <itunes:episode>32</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: </span><span style="font-weight:400;">Ohad Maislish </span></p>
<p><span style="font-weight:400;">Guest Title: </span><strong>Co-Founder &amp; CEO </strong></p>
<p><span style="font-weight:400;">Company: </span><span style="font-weight:400;">env0</span></p>
<p><span style="font-weight:400;"><strong>Abstract</strong></span></p>
<p><span style="font-weight:400;">Infrastructure as code is one of the most interesting technologies in the market. It enables organizations to deploy heavy workloads within seconds and avoid risky configuration mistakes. In this episode, we talked with Ohad Maislish, Co-Founder and CEO at env0, about infrastructure as code technology, how and where it is being used, and how env0 helps organizations to better utilize this technology.</span></p>
<p><strong>Timing</strong></p>
<p><span style="font-weight:400;">0:00 introducing our guest</span></p>
<p><span style="font-weight:400;">2:26 What is infrastructure as a code</span></p>
<p><span style="font-weight:400;">10:16 Examples for practical deployment of IaaC</span></p>
<p><span style="font-weight:400;">13:55 How IaaC is helping governance </span></p>
<p><span style="font-weight:400;">19:20 IaaC behind the scenes</span></p>
<p><span style="font-weight:400;">25:18 IaaC in a multi-cloud environment</span></p>
<p><span style="font-weight:400;">28:40 Summary and last words</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/silverlining-podcast-32.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-32-understanding-infrastructure-as-code-and-how-to-use-it-effectively&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-32-understanding-infrastructure-as-code-and-how-to-use-it-effectively&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=c24faf478c0a6b02d2cb199507f74f94412d5cca26a95105d3a72eada1b7703e" length="75993804"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Ohad Maislish 
Guest Title: Co-Founder & CEO 
Company: env0
Abstract
Infrastructure as code is one of the most interesting technologies in the market. It enables organizations to deploy heavy workloads within seconds and avoid risky configuration mistakes. In this episode, we talked with Ohad Maislish, Co-Founder and CEO at env0, about infrastructure as code technology, how and where it is being used, and how env0 helps organizations to better utilize this technology.
Timing
0:00 introducing our guest
2:26 What is infrastructure as a code
10:16 Examples for practical deployment of IaaC
13:55 How IaaC is helping governance 
19:20 IaaC behind the scenes
25:18 IaaC in a multi-cloud environment
28:40 Summary and last words]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/IMG-20200913-102541.jpg"></itunes:image>
                                                                            <itunes:duration>00:31:39</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 31: Understanding Cloud Native Security Basics]]>
                </title>
                <pubDate>Wed, 23 Dec 2020 04:46:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-31-understanding-cloud-native-security-basics</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-31-understanding-cloud-native-security-basics</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: </span><span style="font-weight:400;">Benjy Portnoy</span></p>
<p><span style="font-weight:400;">Guest Title:</span><span style="font-weight:400;"> </span><strong>Sr. Director, Solution Architects</strong></p>
<p><span style="font-weight:400;">Company: </span><span style="font-weight:400;">Aqua Security</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">A cloud-native security strategy entails protecting the infrastructure, build, and running workloads. In this episode, we spoke with Benjy Portnoy, Sr Director of Solution Architects at Aqua Security regarding cloud-native security fundamentals. We also delve into various attacks identified in the recently published Cloud Native Threat Report by Aqua's security research team, Nautilus.</span></p>
<p><strong>Timing</strong></p>
<p><span style="font-weight:400;">0:00 introducing our guest</span></p>
<p><span style="font-weight:400;">2:50 what is cloud native security</span></p>
<p><span style="font-weight:400;">5:11 Sorting out between CWPP, CSPM &amp; DevSecOps</span></p>
<p><span style="font-weight:400;">8:01 Protecting the build, the platform and workload</span></p>
<p><span style="font-weight:400;">10:30 Understanding what is CASB </span></p>
<p><span style="font-weight:400;">12:45 diving into the kinsing attack</span></p>
<p><span style="font-weight:400;">29.11 Summary and last words</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Benjy Portnoy
Guest Title: Sr. Director, Solution Architects
Company: Aqua Security
Abstract
A cloud-native security strategy entails protecting the infrastructure, build, and running workloads. In this episode, we spoke with Benjy Portnoy, Sr Director of Solution Architects at Aqua Security regarding cloud-native security fundamentals. We also delve into various attacks identified in the recently published Cloud Native Threat Report by Aqua's security research team, Nautilus.
Timing
0:00 introducing our guest
2:50 what is cloud native security
5:11 Sorting out between CWPP, CSPM & DevSecOps
8:01 Protecting the build, the platform and workload
10:30 Understanding what is CASB 
12:45 diving into the kinsing attack
29.11 Summary and last words]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 31: Understanding Cloud Native Security Basics]]>
                </itunes:title>
                                    <itunes:episode>31</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: </span><span style="font-weight:400;">Benjy Portnoy</span></p>
<p><span style="font-weight:400;">Guest Title:</span><span style="font-weight:400;"> </span><strong>Sr. Director, Solution Architects</strong></p>
<p><span style="font-weight:400;">Company: </span><span style="font-weight:400;">Aqua Security</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">A cloud-native security strategy entails protecting the infrastructure, build, and running workloads. In this episode, we spoke with Benjy Portnoy, Sr Director of Solution Architects at Aqua Security regarding cloud-native security fundamentals. We also delve into various attacks identified in the recently published Cloud Native Threat Report by Aqua's security research team, Nautilus.</span></p>
<p><strong>Timing</strong></p>
<p><span style="font-weight:400;">0:00 introducing our guest</span></p>
<p><span style="font-weight:400;">2:50 what is cloud native security</span></p>
<p><span style="font-weight:400;">5:11 Sorting out between CWPP, CSPM &amp; DevSecOps</span></p>
<p><span style="font-weight:400;">8:01 Protecting the build, the platform and workload</span></p>
<p><span style="font-weight:400;">10:30 Understanding what is CASB </span></p>
<p><span style="font-weight:400;">12:45 diving into the kinsing attack</span></p>
<p><span style="font-weight:400;">29.11 Summary and last words</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/silverlining-podcast-31.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-31-understanding-cloud-native-security-basics&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-31-understanding-cloud-native-security-basics&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=ca04aa834cdceadfb229a63864bcff41b9a59d3de0dea5007040d8d8f8cfc18c" length="77371884"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Benjy Portnoy
Guest Title: Sr. Director, Solution Architects
Company: Aqua Security
Abstract
A cloud-native security strategy entails protecting the infrastructure, build, and running workloads. In this episode, we spoke with Benjy Portnoy, Sr Director of Solution Architects at Aqua Security regarding cloud-native security fundamentals. We also delve into various attacks identified in the recently published Cloud Native Threat Report by Aqua's security research team, Nautilus.
Timing
0:00 introducing our guest
2:50 what is cloud native security
5:11 Sorting out between CWPP, CSPM & DevSecOps
8:01 Protecting the build, the platform and workload
10:30 Understanding what is CASB 
12:45 diving into the kinsing attack
29.11 Summary and last words]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/PXL-20201103-100121451.jpg"></itunes:image>
                                                                            <itunes:duration>00:32:14</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 30:  The challenges of CISO in a security company]]>
                </title>
                <pubDate>Tue, 08 Dec 2020 20:19:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-30-the-challenges-of-ciso-in-a-security-company</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-30-the-challenges-of-ciso-in-a-security-company</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: </span><span style="font-weight:400;">Eitan Satmary</span></p>
<p><span style="font-weight:400;">Guest Title: </span><span style="font-weight:400;">CISO </span></p>
<p><span style="font-weight:400;">Company: </span><span style="font-weight:400;">Tufin</span></p>
<p><strong>Abstract</strong></p>
<p>Being a CISO is challenging, being a CISO at a security vendor is even more challenging. In this episode we host Eitan Satmary, CISO for Tufin, to talk about the good and bad of being a CISO in a cyber security vendor. We will talk about CISO's ability to influence innovation and product roadmap in the company and how the transition from on-prem offering to SaaS offering changed the company's security posture.</p>
<p><strong>Timing:</strong></p>
<p>0:00 introducing our guest</p>
<p>4:20 CISO in a security company:  influence the innovation team</p>
<p>10:30 the relationship between CISO and the sales department</p>
<p>12:30 the company journey of adding cloud capabilities</p>
<p>15:00 CISO’s first steps</p>
<p>20:11 Risk management considerations for SaaS companies</p>
<p>25:00  Summary and final thoughts</p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Eitan Satmary
Guest Title: CISO 
Company: Tufin
Abstract
Being a CISO is challenging, being a CISO at a security vendor is even more challenging. In this episode we host Eitan Satmary, CISO for Tufin, to talk about the good and bad of being a CISO in a cyber security vendor. We will talk about CISO's ability to influence innovation and product roadmap in the company and how the transition from on-prem offering to SaaS offering changed the company's security posture.
Timing:
0:00 introducing our guest
4:20 CISO in a security company:  influence the innovation team
10:30 the relationship between CISO and the sales department
12:30 the company journey of adding cloud capabilities
15:00 CISO’s first steps
20:11 Risk management considerations for SaaS companies
25:00  Summary and final thoughts]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 30:  The challenges of CISO in a security company]]>
                </itunes:title>
                                    <itunes:episode>30</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: </span><span style="font-weight:400;">Eitan Satmary</span></p>
<p><span style="font-weight:400;">Guest Title: </span><span style="font-weight:400;">CISO </span></p>
<p><span style="font-weight:400;">Company: </span><span style="font-weight:400;">Tufin</span></p>
<p><strong>Abstract</strong></p>
<p>Being a CISO is challenging, being a CISO at a security vendor is even more challenging. In this episode we host Eitan Satmary, CISO for Tufin, to talk about the good and bad of being a CISO in a cyber security vendor. We will talk about CISO's ability to influence innovation and product roadmap in the company and how the transition from on-prem offering to SaaS offering changed the company's security posture.</p>
<p><strong>Timing:</strong></p>
<p>0:00 introducing our guest</p>
<p>4:20 CISO in a security company:  influence the innovation team</p>
<p>10:30 the relationship between CISO and the sales department</p>
<p>12:30 the company journey of adding cloud capabilities</p>
<p>15:00 CISO’s first steps</p>
<p>20:11 Risk management considerations for SaaS companies</p>
<p>25:00  Summary and final thoughts</p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/silverlining-podcast-30.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-30-the-challenges-of-ciso-in-a-security-company&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-30-the-challenges-of-ciso-in-a-security-company&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=5efb4bf443942c0da7c68fbfcc51ba1c69feed69343f6f4dea8757acf0ee4f9f" length="71819892"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Eitan Satmary
Guest Title: CISO 
Company: Tufin
Abstract
Being a CISO is challenging, being a CISO at a security vendor is even more challenging. In this episode we host Eitan Satmary, CISO for Tufin, to talk about the good and bad of being a CISO in a cyber security vendor. We will talk about CISO's ability to influence innovation and product roadmap in the company and how the transition from on-prem offering to SaaS offering changed the company's security posture.
Timing:
0:00 introducing our guest
4:20 CISO in a security company:  influence the innovation team
10:30 the relationship between CISO and the sales department
12:30 the company journey of adding cloud capabilities
15:00 CISO’s first steps
20:11 Risk management considerations for SaaS companies
25:00  Summary and final thoughts]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/IMG-20200913-121153.jpg"></itunes:image>
                                                                            <itunes:duration>00:29:55</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 29: Cloud Identity Governance - understanding challenges]]>
                </title>
                <pubDate>Wed, 25 Nov 2020 08:16:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-29-cloud-identity-governance-understanding-challenges</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-29-cloud-identity-governance-understanding-challenges</link>
                                <description>
                                            <![CDATA[<p><strong>Sponsored By:</strong></p>
<p><a href="mailto:info@ermetic.com" target="_blank" rel="noreferrer noopener"><strong><img style="margin-left:auto;margin-right:auto;" src="https://www.linkpicture.com/q/Logo-Ermetic-for_bright-2-1.png" alt="" width="278" height="111" /></strong></a></p>
<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest:</span><span style="font-weight:400;"> Arick Goomanovsky</span></p>
<p><span style="font-weight:400;">Guest title: </span><span style="font-weight:400;">Co-Founder &amp; Chief Business Officer</span></p>
<p><span style="font-weight:400;">Company: </span><span style="font-weight:400;">Ermetic</span></p>
<h4>Abstract</h4>
<p><span style="font-weight:400;">In cloud platforms, identity and permissions are the most important control that customers get to implement. Network segmentation and other traditional controls are often ineffective and access to resources is determined by a mixture of roles &amp; policies. This mixture can become very complex and difficult to lock down. In this episode, we are hosting Arick Goomanovsky, Chief Business Officer at Ermetic, to discuss Cloud identity and access challenges, and to review real life examples of what can happen when neglecting identity and access entitlements in cloud infrastructure.</span></p>
<p><strong>Mail to: <a href="mailto:info@ermetic.com">info@ermetic.com</a></strong></p>
<p><strong>Timing:</strong></p>
<p><span style="font-weight:400;">0:00  Introducing our guest and Ermetic</span></p>
<p><span style="font-weight:400;">2:21  Understanding Identity Governance</span></p>
<p><span style="font-weight:400;">4:40  Cloud identity challenges</span></p>
<p><span style="font-weight:400;">10:55 Dealing with identity challenges by adding visualization and analysis of permissions</span></p>
<p><span style="font-weight:400;">16:30 Who are the organizational stakeholders relevant?</span></p>
<p><span style="font-weight:400;">22:01 Examples for IAM challenges and outbreaks</span></p>
<p><span style="font-weight:400;">22:25 Example 1: Protecting sensitive resources</span></p>
<p><span style="font-weight:400;">26:25 Example 2: Third party access</span></p>
<p><span style="font-weight:400;">29:49 Example 3: The visibility challenge when using SSO</span></p>
<p><span style="font-weight:400;">31:30 Summary and final words</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Sponsored By:

Attendees
Guest: Arick Goomanovsky
Guest title: Co-Founder & Chief Business Officer
Company: Ermetic
Abstract
In cloud platforms, identity and permissions are the most important control that customers get to implement. Network segmentation and other traditional controls are often ineffective and access to resources is determined by a mixture of roles & policies. This mixture can become very complex and difficult to lock down. In this episode, we are hosting Arick Goomanovsky, Chief Business Officer at Ermetic, to discuss Cloud identity and access challenges, and to review real life examples of what can happen when neglecting identity and access entitlements in cloud infrastructure.
Mail to: info@ermetic.com
Timing:
0:00  Introducing our guest and Ermetic
2:21  Understanding Identity Governance
4:40  Cloud identity challenges
10:55 Dealing with identity challenges by adding visualization and analysis of permissions
16:30 Who are the organizational stakeholders relevant?
22:01 Examples for IAM challenges and outbreaks
22:25 Example 1: Protecting sensitive resources
26:25 Example 2: Third party access
29:49 Example 3: The visibility challenge when using SSO
31:30 Summary and final words]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 29: Cloud Identity Governance - understanding challenges]]>
                </itunes:title>
                                    <itunes:episode>29</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Sponsored By:</strong></p>
<p><a href="mailto:info@ermetic.com" target="_blank" rel="noreferrer noopener"><strong><img style="margin-left:auto;margin-right:auto;" src="https://www.linkpicture.com/q/Logo-Ermetic-for_bright-2-1.png" alt="" width="278" height="111" /></strong></a></p>
<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest:</span><span style="font-weight:400;"> Arick Goomanovsky</span></p>
<p><span style="font-weight:400;">Guest title: </span><span style="font-weight:400;">Co-Founder &amp; Chief Business Officer</span></p>
<p><span style="font-weight:400;">Company: </span><span style="font-weight:400;">Ermetic</span></p>
<h4>Abstract</h4>
<p><span style="font-weight:400;">In cloud platforms, identity and permissions are the most important control that customers get to implement. Network segmentation and other traditional controls are often ineffective and access to resources is determined by a mixture of roles &amp; policies. This mixture can become very complex and difficult to lock down. In this episode, we are hosting Arick Goomanovsky, Chief Business Officer at Ermetic, to discuss Cloud identity and access challenges, and to review real life examples of what can happen when neglecting identity and access entitlements in cloud infrastructure.</span></p>
<p><strong>Mail to: <a href="mailto:info@ermetic.com">info@ermetic.com</a></strong></p>
<p><strong>Timing:</strong></p>
<p><span style="font-weight:400;">0:00  Introducing our guest and Ermetic</span></p>
<p><span style="font-weight:400;">2:21  Understanding Identity Governance</span></p>
<p><span style="font-weight:400;">4:40  Cloud identity challenges</span></p>
<p><span style="font-weight:400;">10:55 Dealing with identity challenges by adding visualization and analysis of permissions</span></p>
<p><span style="font-weight:400;">16:30 Who are the organizational stakeholders relevant?</span></p>
<p><span style="font-weight:400;">22:01 Examples for IAM challenges and outbreaks</span></p>
<p><span style="font-weight:400;">22:25 Example 1: Protecting sensitive resources</span></p>
<p><span style="font-weight:400;">26:25 Example 2: Third party access</span></p>
<p><span style="font-weight:400;">29:49 Example 3: The visibility challenge when using SSO</span></p>
<p><span style="font-weight:400;">31:30 Summary and final words</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/silverlining-podcast-29.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-29-cloud-identity-governance-understanding-challenges&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-29-cloud-identity-governance-understanding-challenges&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=451f717eb824323f31e0e6cbe10f465338e108c4c7827d23a3841dcc19adc79a" length="86781456"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Sponsored By:

Attendees
Guest: Arick Goomanovsky
Guest title: Co-Founder & Chief Business Officer
Company: Ermetic
Abstract
In cloud platforms, identity and permissions are the most important control that customers get to implement. Network segmentation and other traditional controls are often ineffective and access to resources is determined by a mixture of roles & policies. This mixture can become very complex and difficult to lock down. In this episode, we are hosting Arick Goomanovsky, Chief Business Officer at Ermetic, to discuss Cloud identity and access challenges, and to review real life examples of what can happen when neglecting identity and access entitlements in cloud infrastructure.
Mail to: info@ermetic.com
Timing:
0:00  Introducing our guest and Ermetic
2:21  Understanding Identity Governance
4:40  Cloud identity challenges
10:55 Dealing with identity challenges by adding visualization and analysis of permissions
16:30 Who are the organizational stakeholders relevant?
22:01 Examples for IAM challenges and outbreaks
22:25 Example 1: Protecting sensitive resources
26:25 Example 2: Third party access
29:49 Example 3: The visibility challenge when using SSO
31:30 Summary and final words]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/PXL-20201103-091558797.jpg"></itunes:image>
                                                                            <itunes:duration>00:36:09</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 28: Analyzing Cloud Attack Vectors - SaaS Marketplaces and Office 365 BEC]]>
                </title>
                <pubDate>Wed, 11 Nov 2020 08:55:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-28-analyzing-cloud-attack-vectors-saas-marketplaces-and-office-365-bec</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-28-analyzing-cloud-attack-vectors-saas-marketplaces-and-office-365-bec</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: </span><span style="font-weight:400;">Ofer Maor</span></p>
<p><span style="font-weight:400;">Guest title: </span><span style="font-weight:400;">Co-Founder &amp; CTO </span></p>
<p><span style="font-weight:400;">Company: </span><span style="font-weight:400;">Mitiga</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">The recent increase of cloud based attacks gives us an opportunity to examine new attack vectors and how attackers exploit new services. In this episode we talked with Ofer Maor, Co-Founder at Mitiga, about new attack vectors in cloud computing and how attackers exploit new services such as marketplaces, community repos and other examples.</span></p>
<p><span style="font-weight:400;">Timing:</span></p>
<p><span style="font-weight:400;">0:00 Introducing our guest and Mitiga</span></p>
<p><span style="font-weight:400;">3:32 Preparing for cloud incident response </span></p>
<p><span style="font-weight:400;">7:15 Cloud attack vector - malicious AMI</span></p>
<p><span style="font-weight:400;">11:00 More attack vectors on marketplaces</span></p>
<p><span style="font-weight:400;">13:18 Github attack vectors</span></p>
<p><span style="font-weight:400;">18:15 attack vector - Business email compromise on 365</span></p>
<p><span style="font-weight:400;">25:44 how to mitigate cloud incidents</span></p>
<p><span style="font-weight:400;">27:58 Summary and last words</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Ofer Maor
Guest title: Co-Founder & CTO 
Company: Mitiga
Abstract
The recent increase of cloud based attacks gives us an opportunity to examine new attack vectors and how attackers exploit new services. In this episode we talked with Ofer Maor, Co-Founder at Mitiga, about new attack vectors in cloud computing and how attackers exploit new services such as marketplaces, community repos and other examples.
Timing:
0:00 Introducing our guest and Mitiga
3:32 Preparing for cloud incident response 
7:15 Cloud attack vector - malicious AMI
11:00 More attack vectors on marketplaces
13:18 Github attack vectors
18:15 attack vector - Business email compromise on 365
25:44 how to mitigate cloud incidents
27:58 Summary and last words]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 28: Analyzing Cloud Attack Vectors - SaaS Marketplaces and Office 365 BEC]]>
                </itunes:title>
                                    <itunes:episode>28</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: </span><span style="font-weight:400;">Ofer Maor</span></p>
<p><span style="font-weight:400;">Guest title: </span><span style="font-weight:400;">Co-Founder &amp; CTO </span></p>
<p><span style="font-weight:400;">Company: </span><span style="font-weight:400;">Mitiga</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">The recent increase of cloud based attacks gives us an opportunity to examine new attack vectors and how attackers exploit new services. In this episode we talked with Ofer Maor, Co-Founder at Mitiga, about new attack vectors in cloud computing and how attackers exploit new services such as marketplaces, community repos and other examples.</span></p>
<p><span style="font-weight:400;">Timing:</span></p>
<p><span style="font-weight:400;">0:00 Introducing our guest and Mitiga</span></p>
<p><span style="font-weight:400;">3:32 Preparing for cloud incident response </span></p>
<p><span style="font-weight:400;">7:15 Cloud attack vector - malicious AMI</span></p>
<p><span style="font-weight:400;">11:00 More attack vectors on marketplaces</span></p>
<p><span style="font-weight:400;">13:18 Github attack vectors</span></p>
<p><span style="font-weight:400;">18:15 attack vector - Business email compromise on 365</span></p>
<p><span style="font-weight:400;">25:44 how to mitigate cloud incidents</span></p>
<p><span style="font-weight:400;">27:58 Summary and last words</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/silverlining-podcast-28.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-28-analyzing-cloud-attack-vectors-saas-marketplaces-and-office-365-bec&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-28-analyzing-cloud-attack-vectors-saas-marketplaces-and-office-365-bec&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=990f0c9a8c162c0c594e558d66c07b8c6ad1db50df5f788631d47d5be6c24e03" length="69684912"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Ofer Maor
Guest title: Co-Founder & CTO 
Company: Mitiga
Abstract
The recent increase of cloud based attacks gives us an opportunity to examine new attack vectors and how attackers exploit new services. In this episode we talked with Ofer Maor, Co-Founder at Mitiga, about new attack vectors in cloud computing and how attackers exploit new services such as marketplaces, community repos and other examples.
Timing:
0:00 Introducing our guest and Mitiga
3:32 Preparing for cloud incident response 
7:15 Cloud attack vector - malicious AMI
11:00 More attack vectors on marketplaces
13:18 Github attack vectors
18:15 attack vector - Business email compromise on 365
25:44 how to mitigate cloud incidents
27:58 Summary and last words]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/CASTOS-PIC-11.11.20.jpg"></itunes:image>
                                                                            <itunes:duration>00:29:02</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 27: Protecting Your Cloud Data With Legal Controls]]>
                </title>
                <pubDate>Wed, 14 Oct 2020 08:00:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-27-protecting-your-cloud-data-with-legal-controls</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-27-protecting-your-cloud-data-with-legal-controls</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: </span><span style="font-weight:400;">Dalit Ben Israel</span></p>
<p><span style="font-weight:400;">Guest title: </span><span style="font-weight:400;">Partner, head of IT &amp; Data protection practice</span></p>
<p><span style="font-weight:400;">Company: </span><span style="font-weight:400;">Naschitz Brandes Amir</span></p>
<p> <span style="font-weight:400;"><strong>In the cloud era,</strong> the information security officer's new best friends are the lawyers in the legal department.   Legal matters such as cross border data transfers, contractual controls and privacy laws becoming critical in cloud migrations. In this episode we talk with Dalit Ben Israel, Partner at NBlaw, about the legal challenges of cloud computing: cross border transfers, the rise of privacy laws and proper contract management and monitoring. </span></p>
<p><strong>Timing:</strong></p>
<p><span style="font-weight:400;">0:00 - Opening</span></p>
<p><span style="font-weight:400;">2:03 - Introduction of our guest</span></p>
<p><span style="font-weight:400;">4:95 - Considerations of data center location and the effect of the Schrems2 judgement invalidating the Privacy shield</span></p>
<p><span style="font-weight:400;">12:50 - The roles and responsibilities of cloud providers and customers </span></p>
<p><span style="font-weight:400;">15:27 - Choosing cloud providers - why do we need lawyers in the process and the obligation to enter into DPAs</span></p>
<p><span style="font-weight:400;">20:00 - Specific challenges with SaaS and agreements with subprocessors</span></p>
<p><span style="font-weight:400;">22:12 – Negotiating cloud contracts - what are the challenges? minimizing risks.</span></p>
<p><span style="font-weight:400;">30:32 - Dispute resolution and venue of jurisdiction</span></p>
<p><span style="font-weight:400;">33:24 - Ongoing contract monitoring</span></p>
<p><span style="font-weight:400;">36:10 - Summary</span></p>
<p><strong> Connect with Dalit here:</strong></p>
<p>Email: <a href="mailto:marketing@nblaw.com">marketing@nblaw.com</a></p>
<p>Website: <a href="http://www.nblaw.com" target="_blank" rel="noreferrer noopener">www.nblaw.com</a></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Dalit Ben Israel
Guest title: Partner, head of IT & Data protection practice
Company: Naschitz Brandes Amir
 In the cloud era, the information security officer's new best friends are the lawyers in the legal department.   Legal matters such as cross border data transfers, contractual controls and privacy laws becoming critical in cloud migrations. In this episode we talk with Dalit Ben Israel, Partner at NBlaw, about the legal challenges of cloud computing: cross border transfers, the rise of privacy laws and proper contract management and monitoring. 
Timing:
0:00 - Opening
2:03 - Introduction of our guest
4:95 - Considerations of data center location and the effect of the Schrems2 judgement invalidating the Privacy shield
12:50 - The roles and responsibilities of cloud providers and customers 
15:27 - Choosing cloud providers - why do we need lawyers in the process and the obligation to enter into DPAs
20:00 - Specific challenges with SaaS and agreements with subprocessors
22:12 – Negotiating cloud contracts - what are the challenges? minimizing risks.
30:32 - Dispute resolution and venue of jurisdiction
33:24 - Ongoing contract monitoring
36:10 - Summary
 Connect with Dalit here:
Email: marketing@nblaw.com
Website: www.nblaw.com]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 27: Protecting Your Cloud Data With Legal Controls]]>
                </itunes:title>
                                    <itunes:episode>27</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: </span><span style="font-weight:400;">Dalit Ben Israel</span></p>
<p><span style="font-weight:400;">Guest title: </span><span style="font-weight:400;">Partner, head of IT &amp; Data protection practice</span></p>
<p><span style="font-weight:400;">Company: </span><span style="font-weight:400;">Naschitz Brandes Amir</span></p>
<p> <span style="font-weight:400;"><strong>In the cloud era,</strong> the information security officer's new best friends are the lawyers in the legal department.   Legal matters such as cross border data transfers, contractual controls and privacy laws becoming critical in cloud migrations. In this episode we talk with Dalit Ben Israel, Partner at NBlaw, about the legal challenges of cloud computing: cross border transfers, the rise of privacy laws and proper contract management and monitoring. </span></p>
<p><strong>Timing:</strong></p>
<p><span style="font-weight:400;">0:00 - Opening</span></p>
<p><span style="font-weight:400;">2:03 - Introduction of our guest</span></p>
<p><span style="font-weight:400;">4:95 - Considerations of data center location and the effect of the Schrems2 judgement invalidating the Privacy shield</span></p>
<p><span style="font-weight:400;">12:50 - The roles and responsibilities of cloud providers and customers </span></p>
<p><span style="font-weight:400;">15:27 - Choosing cloud providers - why do we need lawyers in the process and the obligation to enter into DPAs</span></p>
<p><span style="font-weight:400;">20:00 - Specific challenges with SaaS and agreements with subprocessors</span></p>
<p><span style="font-weight:400;">22:12 – Negotiating cloud contracts - what are the challenges? minimizing risks.</span></p>
<p><span style="font-weight:400;">30:32 - Dispute resolution and venue of jurisdiction</span></p>
<p><span style="font-weight:400;">33:24 - Ongoing contract monitoring</span></p>
<p><span style="font-weight:400;">36:10 - Summary</span></p>
<p><strong> Connect with Dalit here:</strong></p>
<p>Email: <a href="mailto:marketing@nblaw.com">marketing@nblaw.com</a></p>
<p>Website: <a href="http://www.nblaw.com" target="_blank" rel="noreferrer noopener">www.nblaw.com</a></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/EP-27.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-27-protecting-your-cloud-data-with-legal-controls&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-27-protecting-your-cloud-data-with-legal-controls&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=e621b9f9ffa945d626f4ccec99f58a72afe62ddfdb45f4ce30b923934e7fd660" length="97876044"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Dalit Ben Israel
Guest title: Partner, head of IT & Data protection practice
Company: Naschitz Brandes Amir
 In the cloud era, the information security officer's new best friends are the lawyers in the legal department.   Legal matters such as cross border data transfers, contractual controls and privacy laws becoming critical in cloud migrations. In this episode we talk with Dalit Ben Israel, Partner at NBlaw, about the legal challenges of cloud computing: cross border transfers, the rise of privacy laws and proper contract management and monitoring. 
Timing:
0:00 - Opening
2:03 - Introduction of our guest
4:95 - Considerations of data center location and the effect of the Schrems2 judgement invalidating the Privacy shield
12:50 - The roles and responsibilities of cloud providers and customers 
15:27 - Choosing cloud providers - why do we need lawyers in the process and the obligation to enter into DPAs
20:00 - Specific challenges with SaaS and agreements with subprocessors
22:12 – Negotiating cloud contracts - what are the challenges? minimizing risks.
30:32 - Dispute resolution and venue of jurisdiction
33:24 - Ongoing contract monitoring
36:10 - Summary
 Connect with Dalit here:
Email: marketing@nblaw.com
Website: www.nblaw.com]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/PIC-EP-27.jpg"></itunes:image>
                                                                            <itunes:duration>00:40:46</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 26: Current Challenges With Cloud]]>
                </title>
                <pubDate>Wed, 16 Sep 2020 12:35:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-26-current-challenges-with-cloud</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-26-current-challenges-with-cloud</link>
                                <description>
                                            <![CDATA[<p class="x_MsoNormal"><strong>This is a special episode where both of us (Moshe &amp; Ariel <span lang="en-us" xml:lang="en-us">– no guests this time</span>) discuss the future of cloud computing and challenges that should be solved. We take a detailed look at shortage in manpower and knowledge, privacy laws and their influence on innovation and technology challenges such as multi tenancy, APi’s, encryption<span lang="en-us" xml:lang="en-us">, continuous monitoring and</span> more.</strong></p>
<h2><strong>Agenda</strong></h2>
<p><strong>Opening words  - 5 min </strong></p>
<ol>
<li style="font-weight:400;"><span style="font-weight:400;">introducing the podcast  - Moshe / Ariel </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Introducing our guest - Ariel</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Introducing myself - Moshe</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Introducing the topic and context of the podcast - Moshe </span></li>
</ol>
<h2><span style="font-weight:400;">Security challenges  </span></h2>
<p><strong>People</strong></p>
<ul>
<li><ul>
<li style="font-weight:400;"><span style="font-weight:400;">Shortage in manpower:  There are missing jobs for cyber professional and especially application security</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Shortage in knowledge: security professional lag behind learning new technologies</span></li>
</ul></li>
</ul>
<p><strong>Process</strong></p>
<ul>
<li><ul>
<li style="font-weight:400;"><span style="font-weight:400;">Malicious insider - one of the biggest challenges for cloud providers</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Shared responsibility model collapsing</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Privacy laws are creating islands of data - Privacy laws are limiting the transfer of data</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Jurisdiction, Court orders and government access to data - as cloud provider host more data - they are a target for more &amp; more government interest</span></li>
</ul></li>
</ul>
<p><strong>Technology</strong></p>
<ul>
<li><ul>
<li style="font-weight:400;"><span style="font-weight:400;">API security best practices - there will be more &amp; more API’s, we did not master how to protect them</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Encryption and key management - the holy grail for holding your own encryption keys is fading</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Multi tenancy - we don't have clear practices on building multi tenant applications</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Identity based access controls - network access controls are useless in cloud computing, but our ability to create granular access controls based on identity is not mature yet </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Multi tenancy </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Continuous monitoring</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Automation and devops - Security automation is still maturing. We still don't know how to integrate developers and operation without breaking best practices</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Using the wrong tools </span></li>
</ul></li>
</ul>
<p><strong>Closure (5 min)</strong></p>
<ol>
<li style="font-weight:400;"><span style="font-weight:400;">Moshe - Summersing </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Ariel - closing </span></li>
</ol>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[This is a special episode where both of us (Moshe & Ariel – no guests this time) discuss the future of cloud computing and challenges that should be solved. We take a detailed look at shortage in manpower and knowledge, privacy laws and their influence on innovation and technology challenges such as multi tenancy, APi’s, encryption, continuous monitoring and more.
Agenda
Opening words  - 5 min 

introducing the podcast  - Moshe / Ariel 
Introducing our guest - Ariel
Introducing myself - Moshe
Introducing the topic and context of the podcast - Moshe 

Security challenges  
People


Shortage in manpower:  There are missing jobs for cyber professional and especially application security
Shortage in knowledge: security professional lag behind learning new technologies


Process


Malicious insider - one of the biggest challenges for cloud providers
Shared responsibility model collapsing
Privacy laws are creating islands of data - Privacy laws are limiting the transfer of data
Jurisdiction, Court orders and government access to data - as cloud provider host more data - they are a target for more & more government interest


Technology


API security best practices - there will be more & more API’s, we did not master how to protect them
Encryption and key management - the holy grail for holding your own encryption keys is fading
Multi tenancy - we don't have clear practices on building multi tenant applications
Identity based access controls - network access controls are useless in cloud computing, but our ability to create granular access controls based on identity is not mature yet 
Multi tenancy 
Continuous monitoring
Automation and devops - Security automation is still maturing. We still don't know how to integrate developers and operation without breaking best practices
Using the wrong tools 


Closure (5 min)

Moshe - Summersing 
Ariel - closing 
]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 26: Current Challenges With Cloud]]>
                </itunes:title>
                                    <itunes:episode>26</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p class="x_MsoNormal"><strong>This is a special episode where both of us (Moshe &amp; Ariel <span lang="en-us" xml:lang="en-us">– no guests this time</span>) discuss the future of cloud computing and challenges that should be solved. We take a detailed look at shortage in manpower and knowledge, privacy laws and their influence on innovation and technology challenges such as multi tenancy, APi’s, encryption<span lang="en-us" xml:lang="en-us">, continuous monitoring and</span> more.</strong></p>
<h2><strong>Agenda</strong></h2>
<p><strong>Opening words  - 5 min </strong></p>
<ol>
<li style="font-weight:400;"><span style="font-weight:400;">introducing the podcast  - Moshe / Ariel </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Introducing our guest - Ariel</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Introducing myself - Moshe</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Introducing the topic and context of the podcast - Moshe </span></li>
</ol>
<h2><span style="font-weight:400;">Security challenges  </span></h2>
<p><strong>People</strong></p>
<ul>
<li><ul>
<li style="font-weight:400;"><span style="font-weight:400;">Shortage in manpower:  There are missing jobs for cyber professional and especially application security</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Shortage in knowledge: security professional lag behind learning new technologies</span></li>
</ul></li>
</ul>
<p><strong>Process</strong></p>
<ul>
<li><ul>
<li style="font-weight:400;"><span style="font-weight:400;">Malicious insider - one of the biggest challenges for cloud providers</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Shared responsibility model collapsing</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Privacy laws are creating islands of data - Privacy laws are limiting the transfer of data</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Jurisdiction, Court orders and government access to data - as cloud provider host more data - they are a target for more &amp; more government interest</span></li>
</ul></li>
</ul>
<p><strong>Technology</strong></p>
<ul>
<li><ul>
<li style="font-weight:400;"><span style="font-weight:400;">API security best practices - there will be more &amp; more API’s, we did not master how to protect them</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Encryption and key management - the holy grail for holding your own encryption keys is fading</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Multi tenancy - we don't have clear practices on building multi tenant applications</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Identity based access controls - network access controls are useless in cloud computing, but our ability to create granular access controls based on identity is not mature yet </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Multi tenancy </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Continuous monitoring</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Automation and devops - Security automation is still maturing. We still don't know how to integrate developers and operation without breaking best practices</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Using the wrong tools </span></li>
</ul></li>
</ul>
<p><strong>Closure (5 min)</strong></p>
<ol>
<li style="font-weight:400;"><span style="font-weight:400;">Moshe - Summersing </span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Ariel - closing </span></li>
</ol>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/EP-26-MP3-CASTOS.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-26-current-challenges-with-cloud&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-26-current-challenges-with-cloud&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=ddc331ef4c1d7c2dccb6aabb6bb51811921dea2fa987d91b26ca1655fce24321" length="47490370"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[This is a special episode where both of us (Moshe & Ariel – no guests this time) discuss the future of cloud computing and challenges that should be solved. We take a detailed look at shortage in manpower and knowledge, privacy laws and their influence on innovation and technology challenges such as multi tenancy, APi’s, encryption, continuous monitoring and more.
Agenda
Opening words  - 5 min 

introducing the podcast  - Moshe / Ariel 
Introducing our guest - Ariel
Introducing myself - Moshe
Introducing the topic and context of the podcast - Moshe 

Security challenges  
People


Shortage in manpower:  There are missing jobs for cyber professional and especially application security
Shortage in knowledge: security professional lag behind learning new technologies


Process


Malicious insider - one of the biggest challenges for cloud providers
Shared responsibility model collapsing
Privacy laws are creating islands of data - Privacy laws are limiting the transfer of data
Jurisdiction, Court orders and government access to data - as cloud provider host more data - they are a target for more & more government interest


Technology


API security best practices - there will be more & more API’s, we did not master how to protect them
Encryption and key management - the holy grail for holding your own encryption keys is fading
Multi tenancy - we don't have clear practices on building multi tenant applications
Identity based access controls - network access controls are useless in cloud computing, but our ability to create granular access controls based on identity is not mature yet 
Multi tenancy 
Continuous monitoring
Automation and devops - Security automation is still maturing. We still don't know how to integrate developers and operation without breaking best practices
Using the wrong tools 


Closure (5 min)

Moshe - Summersing 
Ariel - closing 
]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/EP-26-PICTURE.jpg"></itunes:image>
                                                                            <itunes:duration>00:49:26</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 25: From Excessive Permissions To Least Privileges - Automating Your IAM Roles]]>
                </title>
                <pubDate>Tue, 01 Sep 2020 21:59:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-25-from-excessive-permissions-to-least-privileges-automating-your-iam-roles</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-25-from-excessive-permissions-to-least-privileges-automating-your-iam-roles</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: </span><span style="font-weight:400;">Shira Shamban</span></p>
<p><span style="font-weight:400;">Guest title: </span><span style="font-weight:400;">CEO &amp; Co-Founder</span></p>
<p><span style="font-weight:400;">Company: </span><span style="font-weight:400;">Solvo<br /><br /></span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">In modern cloud environments, Identity and Access Management controls are crucial controls. Many of the access decisions are now made not based on networking structure but rather on roles and permissions. In this episode we talk (again) with Shira Shamban, founder at Solvo about cloud IAM challenges - why is it so hard to get IAM right and how Solvo is planning to revolutionize the IAM management process. </span></p>
<p><strong>Timing:</strong></p>
<p><span style="font-weight:400;">0:00 Introducing our guest</span></p>
<p><span style="font-weight:400;">3:00 Introducing cloud identity challenges </span></p>
<p><span style="font-weight:400;">6:20 Why role management is not enough</span></p>
<p><span style="font-weight:400;">11:40 Why we fail to create least-privilege-roles  </span></p>
<p><span style="font-weight:400;">15:10 How to manage IAM securly - the people angle</span></p>
<p><span style="font-weight:400;">18:13 How to manage IAM securly - the process angle</span></p>
<p><span style="font-weight:400;">21:08 How to manage IAM securly - the technology angle</span></p>
<p><span style="font-weight:400;">31:08 Summary and last words</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Shira Shamban
Guest title: CEO & Co-Founder
Company: Solvo
Abstract
In modern cloud environments, Identity and Access Management controls are crucial controls. Many of the access decisions are now made not based on networking structure but rather on roles and permissions. In this episode we talk (again) with Shira Shamban, founder at Solvo about cloud IAM challenges - why is it so hard to get IAM right and how Solvo is planning to revolutionize the IAM management process. 
Timing:
0:00 Introducing our guest
3:00 Introducing cloud identity challenges 
6:20 Why role management is not enough
11:40 Why we fail to create least-privilege-roles  
15:10 How to manage IAM securly - the people angle
18:13 How to manage IAM securly - the process angle
21:08 How to manage IAM securly - the technology angle
31:08 Summary and last words]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 25: From Excessive Permissions To Least Privileges - Automating Your IAM Roles]]>
                </itunes:title>
                                    <itunes:episode>25</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: </span><span style="font-weight:400;">Shira Shamban</span></p>
<p><span style="font-weight:400;">Guest title: </span><span style="font-weight:400;">CEO &amp; Co-Founder</span></p>
<p><span style="font-weight:400;">Company: </span><span style="font-weight:400;">Solvo<br /><br /></span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">In modern cloud environments, Identity and Access Management controls are crucial controls. Many of the access decisions are now made not based on networking structure but rather on roles and permissions. In this episode we talk (again) with Shira Shamban, founder at Solvo about cloud IAM challenges - why is it so hard to get IAM right and how Solvo is planning to revolutionize the IAM management process. </span></p>
<p><strong>Timing:</strong></p>
<p><span style="font-weight:400;">0:00 Introducing our guest</span></p>
<p><span style="font-weight:400;">3:00 Introducing cloud identity challenges </span></p>
<p><span style="font-weight:400;">6:20 Why role management is not enough</span></p>
<p><span style="font-weight:400;">11:40 Why we fail to create least-privilege-roles  </span></p>
<p><span style="font-weight:400;">15:10 How to manage IAM securly - the people angle</span></p>
<p><span style="font-weight:400;">18:13 How to manage IAM securly - the process angle</span></p>
<p><span style="font-weight:400;">21:08 How to manage IAM securly - the technology angle</span></p>
<p><span style="font-weight:400;">31:08 Summary and last words</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/EPISODE-25.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-25-from-excessive-permissions-to-least-privileges-automating-your-iam-roles&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-25-from-excessive-permissions-to-least-privileges-automating-your-iam-roles&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=a7b635363f61dabe5df0a4e17f765f53aa13fdf741775faf56eba18011ff9a3d" length="33753829"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Shira Shamban
Guest title: CEO & Co-Founder
Company: Solvo
Abstract
In modern cloud environments, Identity and Access Management controls are crucial controls. Many of the access decisions are now made not based on networking structure but rather on roles and permissions. In this episode we talk (again) with Shira Shamban, founder at Solvo about cloud IAM challenges - why is it so hard to get IAM right and how Solvo is planning to revolutionize the IAM management process. 
Timing:
0:00 Introducing our guest
3:00 Introducing cloud identity challenges 
6:20 Why role management is not enough
11:40 Why we fail to create least-privilege-roles  
15:10 How to manage IAM securly - the people angle
18:13 How to manage IAM securly - the process angle
21:08 How to manage IAM securly - the technology angle
31:08 Summary and last words]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/EP-25-PIC.jpg"></itunes:image>
                                                                            <itunes:duration>00:35:08</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 24: Putting The Sec Into DevOps]]>
                </title>
                <pubDate>Wed, 19 Aug 2020 06:00:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-24-putting-the-sec-into-devops</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-24-putting-the-sec-into-devops</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: </span><span style="font-weight:400;">Dima Revelis</span></p>
<p><span style="font-weight:400;">Guest title: </span><span style="font-weight:400;">Senior Devops engineer</span></p>
<p><span style="font-weight:400;">Company: MoonActive</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">DevsecOps is accelerating fast as the new buzzword for modern information security practices. In this episode we use the expertise of Dima Revelis in order to dive deep into understanding DevOps practices, what is CI/ CD pipeline and which security tools are relevant for all of those new practices.</span></p>
<p><strong>Timing</strong><span style="font-weight:400;">:</span></p>
<p><span style="font-weight:400;">0:00 - Introducing our guest</span></p>
<p><span style="font-weight:400;">2:50 - What is devops</span></p>
<p><span style="font-weight:400;">7:50 - What is deployment pipeline</span></p>
<p><span style="font-weight:400;">14:20 - What is CI and which security testing can be implemented</span></p>
<p><span style="font-weight:400;">17:20 - What is CD and which security consideration </span></p>
<p><span style="font-weight:400;">18:40 - Dive deeper into security testing - QA, code review, static &amp; dynamic   analysis</span></p>
<p><span style="font-weight:400;">20:45 - So much automation, do we still need manual testing? </span></p>
<p><span style="font-weight:400;">22:30 - Additional security aspects: using Jenkins, authentication and authorization, secret management</span></p>
<p><span style="font-weight:400;">26:40 - Availability considerations and disaster recovery</span></p>
<p><span style="font-weight:400;">33:30 - Summary and final words</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Dima Revelis
Guest title: Senior Devops engineer
Company: MoonActive
Abstract
DevsecOps is accelerating fast as the new buzzword for modern information security practices. In this episode we use the expertise of Dima Revelis in order to dive deep into understanding DevOps practices, what is CI/ CD pipeline and which security tools are relevant for all of those new practices.
Timing:
0:00 - Introducing our guest
2:50 - What is devops
7:50 - What is deployment pipeline
14:20 - What is CI and which security testing can be implemented
17:20 - What is CD and which security consideration 
18:40 - Dive deeper into security testing - QA, code review, static & dynamic   analysis
20:45 - So much automation, do we still need manual testing? 
22:30 - Additional security aspects: using Jenkins, authentication and authorization, secret management
26:40 - Availability considerations and disaster recovery
33:30 - Summary and final words]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 24: Putting The Sec Into DevOps]]>
                </itunes:title>
                                    <itunes:episode>24</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: </span><span style="font-weight:400;">Dima Revelis</span></p>
<p><span style="font-weight:400;">Guest title: </span><span style="font-weight:400;">Senior Devops engineer</span></p>
<p><span style="font-weight:400;">Company: MoonActive</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">DevsecOps is accelerating fast as the new buzzword for modern information security practices. In this episode we use the expertise of Dima Revelis in order to dive deep into understanding DevOps practices, what is CI/ CD pipeline and which security tools are relevant for all of those new practices.</span></p>
<p><strong>Timing</strong><span style="font-weight:400;">:</span></p>
<p><span style="font-weight:400;">0:00 - Introducing our guest</span></p>
<p><span style="font-weight:400;">2:50 - What is devops</span></p>
<p><span style="font-weight:400;">7:50 - What is deployment pipeline</span></p>
<p><span style="font-weight:400;">14:20 - What is CI and which security testing can be implemented</span></p>
<p><span style="font-weight:400;">17:20 - What is CD and which security consideration </span></p>
<p><span style="font-weight:400;">18:40 - Dive deeper into security testing - QA, code review, static &amp; dynamic   analysis</span></p>
<p><span style="font-weight:400;">20:45 - So much automation, do we still need manual testing? </span></p>
<p><span style="font-weight:400;">22:30 - Additional security aspects: using Jenkins, authentication and authorization, secret management</span></p>
<p><span style="font-weight:400;">26:40 - Availability considerations and disaster recovery</span></p>
<p><span style="font-weight:400;">33:30 - Summary and final words</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/EPISODE-24.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-24-putting-the-sec-into-devops&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-24-putting-the-sec-into-devops&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=e0fb4fa1bda1f40c6b6d99092f3a7dc69c512e523002d975a2599365449ccbaa" length="35770734"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Dima Revelis
Guest title: Senior Devops engineer
Company: MoonActive
Abstract
DevsecOps is accelerating fast as the new buzzword for modern information security practices. In this episode we use the expertise of Dima Revelis in order to dive deep into understanding DevOps practices, what is CI/ CD pipeline and which security tools are relevant for all of those new practices.
Timing:
0:00 - Introducing our guest
2:50 - What is devops
7:50 - What is deployment pipeline
14:20 - What is CI and which security testing can be implemented
17:20 - What is CD and which security consideration 
18:40 - Dive deeper into security testing - QA, code review, static & dynamic   analysis
20:45 - So much automation, do we still need manual testing? 
22:30 - Additional security aspects: using Jenkins, authentication and authorization, secret management
26:40 - Availability considerations and disaster recovery
33:30 - Summary and final words]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/EPISODE-24-PICTURE.jpg"></itunes:image>
                                                                            <itunes:duration>00:37:14</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 23: Understanding Microsoft Cloud Security Pillars]]>
                </title>
                <pubDate>Tue, 04 Aug 2020 16:17:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-23-understanding-microsoft-cloud-security-pillars</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-23-understanding-microsoft-cloud-security-pillars</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: </span><span style="font-weight:400;">Yoad Dvir</span></p>
<p><span style="font-weight:400;">Guest title: </span><em><span style="font-weight:400;">Security Lead, Central and Eastern Europe</span></em></p>
<p><span style="font-weight:400;">Company: Microsoft</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Microsoft security portfolio has been growing and diversifying in the last couple of years, adding more capabilities at various areas of information security. In order to better understand Microsoft strategy and offering, we talked with Yoad Dvir, Cyber Security Lead at Microsoft, about the Microsoft new security pillars:  Monitoring, Threat Protection and Information Protection.</span></p>
<p><strong>Timing</strong><span style="font-weight:400;">:</span></p>
<p><span style="font-weight:400;"> 0:00 - Introducing our guest</span></p>
<p><span style="font-weight:400;">5:45  - Introducing Microsoft security strategy</span></p>
<p><span style="font-weight:400;">12:50 - Security monitoring pillars - Azure monitor, Sentinel, Azure analytics and more</span></p>
<p><span style="font-weight:400;">21:10 - Microsoft Threat Protection family - Cloudapp, O365 ATP, Defender ATP, Azure ATP</span></p>
<p><span style="font-weight:400;">30:50 - diving deeper into Cloudapp</span></p>
<p><span style="font-weight:400;">35:30 - Microsoft Information Protection </span></p>
<p><span style="font-weight:400;">44:00 - summary and last words</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Yoad Dvir
Guest title: Security Lead, Central and Eastern Europe
Company: Microsoft
Abstract
Microsoft security portfolio has been growing and diversifying in the last couple of years, adding more capabilities at various areas of information security. In order to better understand Microsoft strategy and offering, we talked with Yoad Dvir, Cyber Security Lead at Microsoft, about the Microsoft new security pillars:  Monitoring, Threat Protection and Information Protection.
Timing:
 0:00 - Introducing our guest
5:45  - Introducing Microsoft security strategy
12:50 - Security monitoring pillars - Azure monitor, Sentinel, Azure analytics and more
21:10 - Microsoft Threat Protection family - Cloudapp, O365 ATP, Defender ATP, Azure ATP
30:50 - diving deeper into Cloudapp
35:30 - Microsoft Information Protection 
44:00 - summary and last words]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 23: Understanding Microsoft Cloud Security Pillars]]>
                </itunes:title>
                                    <itunes:episode>23</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: </span><span style="font-weight:400;">Yoad Dvir</span></p>
<p><span style="font-weight:400;">Guest title: </span><em><span style="font-weight:400;">Security Lead, Central and Eastern Europe</span></em></p>
<p><span style="font-weight:400;">Company: Microsoft</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Microsoft security portfolio has been growing and diversifying in the last couple of years, adding more capabilities at various areas of information security. In order to better understand Microsoft strategy and offering, we talked with Yoad Dvir, Cyber Security Lead at Microsoft, about the Microsoft new security pillars:  Monitoring, Threat Protection and Information Protection.</span></p>
<p><strong>Timing</strong><span style="font-weight:400;">:</span></p>
<p><span style="font-weight:400;"> 0:00 - Introducing our guest</span></p>
<p><span style="font-weight:400;">5:45  - Introducing Microsoft security strategy</span></p>
<p><span style="font-weight:400;">12:50 - Security monitoring pillars - Azure monitor, Sentinel, Azure analytics and more</span></p>
<p><span style="font-weight:400;">21:10 - Microsoft Threat Protection family - Cloudapp, O365 ATP, Defender ATP, Azure ATP</span></p>
<p><span style="font-weight:400;">30:50 - diving deeper into Cloudapp</span></p>
<p><span style="font-weight:400;">35:30 - Microsoft Information Protection </span></p>
<p><span style="font-weight:400;">44:00 - summary and last words</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/EP-23-5.8.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-23-understanding-microsoft-cloud-security-pillars&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-23-understanding-microsoft-cloud-security-pillars&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=531755cdadd31976667888bf8e5c5e5bdf6aeb99bdb69b4a7585796c5996cc72" length="45814180"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Yoad Dvir
Guest title: Security Lead, Central and Eastern Europe
Company: Microsoft
Abstract
Microsoft security portfolio has been growing and diversifying in the last couple of years, adding more capabilities at various areas of information security. In order to better understand Microsoft strategy and offering, we talked with Yoad Dvir, Cyber Security Lead at Microsoft, about the Microsoft new security pillars:  Monitoring, Threat Protection and Information Protection.
Timing:
 0:00 - Introducing our guest
5:45  - Introducing Microsoft security strategy
12:50 - Security monitoring pillars - Azure monitor, Sentinel, Azure analytics and more
21:10 - Microsoft Threat Protection family - Cloudapp, O365 ATP, Defender ATP, Azure ATP
30:50 - diving deeper into Cloudapp
35:30 - Microsoft Information Protection 
44:00 - summary and last words]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/ep-23-pic.jpg"></itunes:image>
                                                                            <itunes:duration>00:47:42</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 22: How To Do Add Open Source Code To Your Applications, Securely]]>
                </title>
                <pubDate>Mon, 03 Aug 2020 17:38:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-22-how-to-do-add-open-source-code-to-your-applications-securely</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-22-how-to-do-add-open-source-code-to-your-applications-securely</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: </span><span style="font-weight:400;">Liran Tal</span></p>
<p><span style="font-weight:400;">Guest title:</span><span style="font-weight:400;"> </span><span style="font-weight:400;">Developer Advocate</span></p>
<p><span style="font-weight:400;">Company:  Synk</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Open source software takes a big part in our daily lives, and also in our development environments. Many applications developers rely on open source libraries &amp;  tools and integrating it into their code. This is a great improvement for developers allowing them to innovate quickly and efficiently. But all this good comes with a big responsibility - open source software should be carefully examined in order to make sure its reliability. In this episode we talk with Liran Tal from Synk about the growing importance of adding security evaluation of open source software in the development cycle.</span></p>
<p><strong>Timing</strong><span style="font-weight:400;">:</span></p>
<p><span style="font-weight:400;"> 0:00 introducing our guest</span></p>
<p><span style="font-weight:400;">5:50 what is the challenge of open-source security</span></p>
<p><span style="font-weight:400;">10:05 - open source security - the people angel</span></p>
<p><span style="font-weight:400;">16:00 - open source security - the process angel</span></p>
<p><span style="font-weight:400;">24:55 - open source security - the technology angel</span></p>
<p><span style="font-weight:400;">29:42 summary and last words</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Liran Tal
Guest title: Developer Advocate
Company:  Synk
Abstract
Open source software takes a big part in our daily lives, and also in our development environments. Many applications developers rely on open source libraries &  tools and integrating it into their code. This is a great improvement for developers allowing them to innovate quickly and efficiently. But all this good comes with a big responsibility - open source software should be carefully examined in order to make sure its reliability. In this episode we talk with Liran Tal from Synk about the growing importance of adding security evaluation of open source software in the development cycle.
Timing:
 0:00 introducing our guest
5:50 what is the challenge of open-source security
10:05 - open source security - the people angel
16:00 - open source security - the process angel
24:55 - open source security - the technology angel
29:42 summary and last words]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 22: How To Do Add Open Source Code To Your Applications, Securely]]>
                </itunes:title>
                                    <itunes:episode>22</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: </span><span style="font-weight:400;">Liran Tal</span></p>
<p><span style="font-weight:400;">Guest title:</span><span style="font-weight:400;"> </span><span style="font-weight:400;">Developer Advocate</span></p>
<p><span style="font-weight:400;">Company:  Synk</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Open source software takes a big part in our daily lives, and also in our development environments. Many applications developers rely on open source libraries &amp;  tools and integrating it into their code. This is a great improvement for developers allowing them to innovate quickly and efficiently. But all this good comes with a big responsibility - open source software should be carefully examined in order to make sure its reliability. In this episode we talk with Liran Tal from Synk about the growing importance of adding security evaluation of open source software in the development cycle.</span></p>
<p><strong>Timing</strong><span style="font-weight:400;">:</span></p>
<p><span style="font-weight:400;"> 0:00 introducing our guest</span></p>
<p><span style="font-weight:400;">5:50 what is the challenge of open-source security</span></p>
<p><span style="font-weight:400;">10:05 - open source security - the people angel</span></p>
<p><span style="font-weight:400;">16:00 - open source security - the process angel</span></p>
<p><span style="font-weight:400;">24:55 - open source security - the technology angel</span></p>
<p><span style="font-weight:400;">29:42 summary and last words</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/silver-lining-ep-22-final-with-ad.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-22-how-to-do-add-open-source-code-to-your-applications-securely&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-22-how-to-do-add-open-source-code-to-your-applications-securely&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=1043229df4f83494500c602d47f72718500a78f2011e6c5d8d61141bb38a531e" length="31379086"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Liran Tal
Guest title: Developer Advocate
Company:  Synk
Abstract
Open source software takes a big part in our daily lives, and also in our development environments. Many applications developers rely on open source libraries &  tools and integrating it into their code. This is a great improvement for developers allowing them to innovate quickly and efficiently. But all this good comes with a big responsibility - open source software should be carefully examined in order to make sure its reliability. In this episode we talk with Liran Tal from Synk about the growing importance of adding security evaluation of open source software in the development cycle.
Timing:
 0:00 introducing our guest
5:50 what is the challenge of open-source security
10:05 - open source security - the people angel
16:00 - open source security - the process angel
24:55 - open source security - the technology angel
29:42 summary and last words]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/EP-22-PIC.jpg"></itunes:image>
                                                                            <itunes:duration>00:32:39</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 21: Building The Next Generation Of Cloud Services]]>
                </title>
                <pubDate>Mon, 03 Aug 2020 17:31:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-21-building-the-next-generation-of-cloud-services</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-21-building-the-next-generation-of-cloud-services</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Eran Feigenbaum</span></p>
<p><span style="font-weight:400;">Guest title:  </span><span style="font-weight:400;">CSO, Oracle Cloud</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">The first generation of cloud services began about 15 years ago and stretched until now, but it came with many built-in challenges due to lack of maturity and the fact that security was added on top and not present from the start. In this episode we talk with Eran Feigenbaum, CISO of Oracle cloud about the next generation of cloud services - how can we build cloud that is more secure,, immuned to miss-configuration and other pitfalls that are relevant to today's cloud services.</span></p>
<p><strong>Timing</strong><span style="font-weight:400;">:</span></p>
<p><span style="font-weight:400;">0:00 introducing our guest</span></p>
<p><span style="font-weight:400;">5:40 Generation one of cloud infrastructure</span></p>
<p><span style="font-weight:400;">8:40 so what is second generation of cloud infrastructure</span></p>
<p><span style="font-weight:400;">10:30 how Oracle is planning to change the cloud market</span></p>
<p><span style="font-weight:400;">11:40 how second generation cloud services can help with common mistakes such as misconfiguration</span></p>
<p><span style="font-weight:400;">13:35 what cloud provider should do in order to increase security</span></p>
<p><span style="font-weight:400;">16:05 how cloud providers can  be proactive with their customers</span></p>
<p><span style="font-weight:400;">19:00 handling miss-configuration such as open buckets and lost API’s keys</span></p>
<p><span style="font-weight:400;">23:40 summary and last words</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Eran Feigenbaum
Guest title:  CSO, Oracle Cloud
Abstract
The first generation of cloud services began about 15 years ago and stretched until now, but it came with many built-in challenges due to lack of maturity and the fact that security was added on top and not present from the start. In this episode we talk with Eran Feigenbaum, CISO of Oracle cloud about the next generation of cloud services - how can we build cloud that is more secure,, immuned to miss-configuration and other pitfalls that are relevant to today's cloud services.
Timing:
0:00 introducing our guest
5:40 Generation one of cloud infrastructure
8:40 so what is second generation of cloud infrastructure
10:30 how Oracle is planning to change the cloud market
11:40 how second generation cloud services can help with common mistakes such as misconfiguration
13:35 what cloud provider should do in order to increase security
16:05 how cloud providers can  be proactive with their customers
19:00 handling miss-configuration such as open buckets and lost API’s keys
23:40 summary and last words]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 21: Building The Next Generation Of Cloud Services]]>
                </itunes:title>
                                    <itunes:episode>21</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Eran Feigenbaum</span></p>
<p><span style="font-weight:400;">Guest title:  </span><span style="font-weight:400;">CSO, Oracle Cloud</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">The first generation of cloud services began about 15 years ago and stretched until now, but it came with many built-in challenges due to lack of maturity and the fact that security was added on top and not present from the start. In this episode we talk with Eran Feigenbaum, CISO of Oracle cloud about the next generation of cloud services - how can we build cloud that is more secure,, immuned to miss-configuration and other pitfalls that are relevant to today's cloud services.</span></p>
<p><strong>Timing</strong><span style="font-weight:400;">:</span></p>
<p><span style="font-weight:400;">0:00 introducing our guest</span></p>
<p><span style="font-weight:400;">5:40 Generation one of cloud infrastructure</span></p>
<p><span style="font-weight:400;">8:40 so what is second generation of cloud infrastructure</span></p>
<p><span style="font-weight:400;">10:30 how Oracle is planning to change the cloud market</span></p>
<p><span style="font-weight:400;">11:40 how second generation cloud services can help with common mistakes such as misconfiguration</span></p>
<p><span style="font-weight:400;">13:35 what cloud provider should do in order to increase security</span></p>
<p><span style="font-weight:400;">16:05 how cloud providers can  be proactive with their customers</span></p>
<p><span style="font-weight:400;">19:00 handling miss-configuration such as open buckets and lost API’s keys</span></p>
<p><span style="font-weight:400;">23:40 summary and last words</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/Ep-21.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-21-building-the-next-generation-of-cloud-services&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-21-building-the-next-generation-of-cloud-services&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=268f9dc6e3a471ada5cea7df779567bc2f84a1ee1401fc8a44daaf2d5ce6741e" length="25934058"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Eran Feigenbaum
Guest title:  CSO, Oracle Cloud
Abstract
The first generation of cloud services began about 15 years ago and stretched until now, but it came with many built-in challenges due to lack of maturity and the fact that security was added on top and not present from the start. In this episode we talk with Eran Feigenbaum, CISO of Oracle cloud about the next generation of cloud services - how can we build cloud that is more secure,, immuned to miss-configuration and other pitfalls that are relevant to today's cloud services.
Timing:
0:00 introducing our guest
5:40 Generation one of cloud infrastructure
8:40 so what is second generation of cloud infrastructure
10:30 how Oracle is planning to change the cloud market
11:40 how second generation cloud services can help with common mistakes such as misconfiguration
13:35 what cloud provider should do in order to increase security
16:05 how cloud providers can  be proactive with their customers
19:00 handling miss-configuration such as open buckets and lost API’s keys
23:40 summary and last words]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/21-pic.jpg"></itunes:image>
                                                                            <itunes:duration>00:26:59</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 20:  The Dark Side Of Privacy]]>
                </title>
                <pubDate>Mon, 03 Aug 2020 17:25:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-20-the-dark-side-of-privacy</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-20-the-dark-side-of-privacy</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: </span><span style="font-weight:400;">Menny Barzilay</span></p>
<p><span style="font-weight:400;">Guest title: Partner @ Herzog Strategic, CTO, ICRC, Tel Aviv University</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">For our 20’ish episode we spoke with a very special guest, the one and only - Menny Barzilay.  Menny is one of the most interesting speakers in the cyber landscape, he is an expert in simplifying complex concepts, integrating interesting stories and great examples into stimulating review of technology challenges we are facing as a community.</span></p>
<p><span style="font-weight:400;">In this episode we talk with Menny about Privacy - why it is so hard to define what exactly is privacy in the modern age, what people miss about the concepts of privacy and how this affects our everyday lives. This talk will make you laugh, will make you sad and definitely will make you think. We hope you will enjoy listening to it as much as we enjoyed recording it. </span></p>
<p><span style="font-weight:400;">Comment: since this is more of a lecture and not a regular podcast, we didn't add our regular podcast timing. Enjoy!</span></p>
<p><strong>Timing</strong><span style="font-weight:400;">:</span></p>
<p><span style="font-weight:400;">0:00 introducing our guest</span></p>
<p><span style="font-weight:400;">5:25 Privacy </span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Menny Barzilay
Guest title: Partner @ Herzog Strategic, CTO, ICRC, Tel Aviv University
Abstract
For our 20’ish episode we spoke with a very special guest, the one and only - Menny Barzilay.  Menny is one of the most interesting speakers in the cyber landscape, he is an expert in simplifying complex concepts, integrating interesting stories and great examples into stimulating review of technology challenges we are facing as a community.
In this episode we talk with Menny about Privacy - why it is so hard to define what exactly is privacy in the modern age, what people miss about the concepts of privacy and how this affects our everyday lives. This talk will make you laugh, will make you sad and definitely will make you think. We hope you will enjoy listening to it as much as we enjoyed recording it. 
Comment: since this is more of a lecture and not a regular podcast, we didn't add our regular podcast timing. Enjoy!
Timing:
0:00 introducing our guest
5:25 Privacy ]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 20:  The Dark Side Of Privacy]]>
                </itunes:title>
                                    <itunes:episode>20</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: </span><span style="font-weight:400;">Menny Barzilay</span></p>
<p><span style="font-weight:400;">Guest title: Partner @ Herzog Strategic, CTO, ICRC, Tel Aviv University</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">For our 20’ish episode we spoke with a very special guest, the one and only - Menny Barzilay.  Menny is one of the most interesting speakers in the cyber landscape, he is an expert in simplifying complex concepts, integrating interesting stories and great examples into stimulating review of technology challenges we are facing as a community.</span></p>
<p><span style="font-weight:400;">In this episode we talk with Menny about Privacy - why it is so hard to define what exactly is privacy in the modern age, what people miss about the concepts of privacy and how this affects our everyday lives. This talk will make you laugh, will make you sad and definitely will make you think. We hope you will enjoy listening to it as much as we enjoyed recording it. </span></p>
<p><span style="font-weight:400;">Comment: since this is more of a lecture and not a regular podcast, we didn't add our regular podcast timing. Enjoy!</span></p>
<p><strong>Timing</strong><span style="font-weight:400;">:</span></p>
<p><span style="font-weight:400;">0:00 introducing our guest</span></p>
<p><span style="font-weight:400;">5:25 Privacy </span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/Ep-20-recording.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-20-the-dark-side-of-privacy&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-20-the-dark-side-of-privacy&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=8c6425754018e2f9e3d45a46cc29db72cd2091964355134d60dc32088993019f" length="50631943"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Menny Barzilay
Guest title: Partner @ Herzog Strategic, CTO, ICRC, Tel Aviv University
Abstract
For our 20’ish episode we spoke with a very special guest, the one and only - Menny Barzilay.  Menny is one of the most interesting speakers in the cyber landscape, he is an expert in simplifying complex concepts, integrating interesting stories and great examples into stimulating review of technology challenges we are facing as a community.
In this episode we talk with Menny about Privacy - why it is so hard to define what exactly is privacy in the modern age, what people miss about the concepts of privacy and how this affects our everyday lives. This talk will make you laugh, will make you sad and definitely will make you think. We hope you will enjoy listening to it as much as we enjoyed recording it. 
Comment: since this is more of a lecture and not a regular podcast, we didn't add our regular podcast timing. Enjoy!
Timing:
0:00 introducing our guest
5:25 Privacy ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/EP-20-PIC.jpg"></itunes:image>
                                                                            <itunes:duration>00:52:42</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 19: Understanding Cloud Attack Vectors]]>
                </title>
                <pubDate>Sun, 02 Aug 2020 13:12:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-19-understanding-cloud-attack-vectors</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-19-understanding-cloud-attack-vectors</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: </span><span style="font-weight:400;">Or Kamara</span></p>
<p><span style="font-weight:400;">Guest Title: </span><span style="font-weight:400;"> Senior team lead </span></p>
<p><span style="font-weight:400;">Company:  Synk</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Cloud computing can bring interesting and new attack vectors. In this episode, we talk with Or Kamara, Senior team lead at Synk, about the Capital-one hacking and what can be learned from the event in order to better protect our networks. We will analyze the attack step by step and add mitigating controls that can help in preventing the next attack.</span></p>
<p><strong>Timing</strong><span style="font-weight:400;">:</span></p>
<p><span style="font-weight:400;">0:35 Introducing our guest</span></p>
<p><span style="font-weight:400;">4:10 introducing the story the capital one hack </span></p>
<p><span style="font-weight:400;">5:45 The phases of the Capital One hack</span></p>
<p><span style="font-weight:400;">7:50 The first misconfiguration - servers exposed to the internet unintentionally</span></p>
<p><span style="font-weight:400;">11:05 the SSRF vulnerability and understanding meta-data service</span></p>
<p><span style="font-weight:400;">19:38 Using API keys for browsing S3 and how to mitigate it</span></p>
<p><span style="font-weight:400;">26:00 things that Capital One did right and additional insights</span></p>
<p><span style="font-weight:400;">28:00 how should developers and IT </span></p>
<p><span style="font-weight:400;">30:50 shifting from traditional security to new cloud security mindset</span></p>
<p><span style="font-weight:400;">36:00 summary and final words</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Or Kamara
Guest Title:  Senior team lead 
Company:  Synk
Abstract
Cloud computing can bring interesting and new attack vectors. In this episode, we talk with Or Kamara, Senior team lead at Synk, about the Capital-one hacking and what can be learned from the event in order to better protect our networks. We will analyze the attack step by step and add mitigating controls that can help in preventing the next attack.
Timing:
0:35 Introducing our guest
4:10 introducing the story the capital one hack 
5:45 The phases of the Capital One hack
7:50 The first misconfiguration - servers exposed to the internet unintentionally
11:05 the SSRF vulnerability and understanding meta-data service
19:38 Using API keys for browsing S3 and how to mitigate it
26:00 things that Capital One did right and additional insights
28:00 how should developers and IT 
30:50 shifting from traditional security to new cloud security mindset
36:00 summary and final words]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 19: Understanding Cloud Attack Vectors]]>
                </itunes:title>
                                    <itunes:episode>19</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: </span><span style="font-weight:400;">Or Kamara</span></p>
<p><span style="font-weight:400;">Guest Title: </span><span style="font-weight:400;"> Senior team lead </span></p>
<p><span style="font-weight:400;">Company:  Synk</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Cloud computing can bring interesting and new attack vectors. In this episode, we talk with Or Kamara, Senior team lead at Synk, about the Capital-one hacking and what can be learned from the event in order to better protect our networks. We will analyze the attack step by step and add mitigating controls that can help in preventing the next attack.</span></p>
<p><strong>Timing</strong><span style="font-weight:400;">:</span></p>
<p><span style="font-weight:400;">0:35 Introducing our guest</span></p>
<p><span style="font-weight:400;">4:10 introducing the story the capital one hack </span></p>
<p><span style="font-weight:400;">5:45 The phases of the Capital One hack</span></p>
<p><span style="font-weight:400;">7:50 The first misconfiguration - servers exposed to the internet unintentionally</span></p>
<p><span style="font-weight:400;">11:05 the SSRF vulnerability and understanding meta-data service</span></p>
<p><span style="font-weight:400;">19:38 Using API keys for browsing S3 and how to mitigate it</span></p>
<p><span style="font-weight:400;">26:00 things that Capital One did right and additional insights</span></p>
<p><span style="font-weight:400;">28:00 how should developers and IT </span></p>
<p><span style="font-weight:400;">30:50 shifting from traditional security to new cloud security mindset</span></p>
<p><span style="font-weight:400;">36:00 summary and final words</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/silver-lining-19-final.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-19-understanding-cloud-attack-vectors&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-19-understanding-cloud-attack-vectors&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=251997eb9bc995e569d2199b9a1aef37c8a02519e02274d17fe35863bfb82c44" length="38772693"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Or Kamara
Guest Title:  Senior team lead 
Company:  Synk
Abstract
Cloud computing can bring interesting and new attack vectors. In this episode, we talk with Or Kamara, Senior team lead at Synk, about the Capital-one hacking and what can be learned from the event in order to better protect our networks. We will analyze the attack step by step and add mitigating controls that can help in preventing the next attack.
Timing:
0:35 Introducing our guest
4:10 introducing the story the capital one hack 
5:45 The phases of the Capital One hack
7:50 The first misconfiguration - servers exposed to the internet unintentionally
11:05 the SSRF vulnerability and understanding meta-data service
19:38 Using API keys for browsing S3 and how to mitigate it
26:00 things that Capital One did right and additional insights
28:00 how should developers and IT 
30:50 shifting from traditional security to new cloud security mindset
36:00 summary and final words]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/Silver-lining-19-photo.jpg"></itunes:image>
                                                                            <itunes:duration>00:40:22</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 18: Testing Cloud Application]]>
                </title>
                <pubDate>Sun, 02 Aug 2020 12:16:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-18-testing-cloud-application</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-18-testing-cloud-application</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: </span><span style="font-weight:400;">Bar Hofesh</span></p>
<p><span style="font-weight:400;">Guest Title: </span><span style="font-weight:400;"> Co-</span><em><span style="font-weight:400;">Founder</span></em></p>
<p><span style="font-weight:400;">Company:  Neurolegion</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Application security is among the hardest things to get right. In this episode we are talking with Bar Hofesh from Neurolegion about the world of automated security testing - what are the challenges, what are the different stages of integration and delivery and how to perform each stage correctly.</span></p>
<p><strong>Timing</strong><span style="font-weight:400;">:</span></p>
<p><span style="font-weight:400;">0:50 - introducing our guest</span></p>
<p><span style="font-weight:400;">2:58 - the need to automate security testing - the challenge of developing faster</span></p>
<p><span style="font-weight:400;">7:15 - so what is testing automation - describing the process - the code  integration stage</span></p>
<p><span style="font-weight:400;">13:50  - security testing the packing and delivery stage</span></p>
<p><span style="font-weight:400;">18:50 - testing live application stage</span></p>
<p><span style="font-weight:400;">20:20 - appsec finding strategy - what do when found an alert</span></p>
<p><span style="font-weight:400;">22:20 - Static analysis vs. dynamic analysis</span></p>
<p><span style="font-weight:400;">24:58 - emerging technologies - RASP, IAST</span></p>
<p><span style="font-weight:400;">30:50 - Is there still room for manual penetration testing?</span></p>
<p><span style="font-weight:400;">34:05 - summary and last words</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Bar Hofesh
Guest Title:  Co-Founder
Company:  Neurolegion
Abstract
Application security is among the hardest things to get right. In this episode we are talking with Bar Hofesh from Neurolegion about the world of automated security testing - what are the challenges, what are the different stages of integration and delivery and how to perform each stage correctly.
Timing:
0:50 - introducing our guest
2:58 - the need to automate security testing - the challenge of developing faster
7:15 - so what is testing automation - describing the process - the code  integration stage
13:50  - security testing the packing and delivery stage
18:50 - testing live application stage
20:20 - appsec finding strategy - what do when found an alert
22:20 - Static analysis vs. dynamic analysis
24:58 - emerging technologies - RASP, IAST
30:50 - Is there still room for manual penetration testing?
34:05 - summary and last words]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 18: Testing Cloud Application]]>
                </itunes:title>
                                    <itunes:episode>18</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: </span><span style="font-weight:400;">Bar Hofesh</span></p>
<p><span style="font-weight:400;">Guest Title: </span><span style="font-weight:400;"> Co-</span><em><span style="font-weight:400;">Founder</span></em></p>
<p><span style="font-weight:400;">Company:  Neurolegion</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Application security is among the hardest things to get right. In this episode we are talking with Bar Hofesh from Neurolegion about the world of automated security testing - what are the challenges, what are the different stages of integration and delivery and how to perform each stage correctly.</span></p>
<p><strong>Timing</strong><span style="font-weight:400;">:</span></p>
<p><span style="font-weight:400;">0:50 - introducing our guest</span></p>
<p><span style="font-weight:400;">2:58 - the need to automate security testing - the challenge of developing faster</span></p>
<p><span style="font-weight:400;">7:15 - so what is testing automation - describing the process - the code  integration stage</span></p>
<p><span style="font-weight:400;">13:50  - security testing the packing and delivery stage</span></p>
<p><span style="font-weight:400;">18:50 - testing live application stage</span></p>
<p><span style="font-weight:400;">20:20 - appsec finding strategy - what do when found an alert</span></p>
<p><span style="font-weight:400;">22:20 - Static analysis vs. dynamic analysis</span></p>
<p><span style="font-weight:400;">24:58 - emerging technologies - RASP, IAST</span></p>
<p><span style="font-weight:400;">30:50 - Is there still room for manual penetration testing?</span></p>
<p><span style="font-weight:400;">34:05 - summary and last words</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/silver-lining-ep-18-final.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-18-testing-cloud-application&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-18-testing-cloud-application&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=1b2a0cd415163a64de40c3c0f78759d65c75a7c8c385ae4e5b5d2ddf02b8231d" length="36635073"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Bar Hofesh
Guest Title:  Co-Founder
Company:  Neurolegion
Abstract
Application security is among the hardest things to get right. In this episode we are talking with Bar Hofesh from Neurolegion about the world of automated security testing - what are the challenges, what are the different stages of integration and delivery and how to perform each stage correctly.
Timing:
0:50 - introducing our guest
2:58 - the need to automate security testing - the challenge of developing faster
7:15 - so what is testing automation - describing the process - the code  integration stage
13:50  - security testing the packing and delivery stage
18:50 - testing live application stage
20:20 - appsec finding strategy - what do when found an alert
22:20 - Static analysis vs. dynamic analysis
24:58 - emerging technologies - RASP, IAST
30:50 - Is there still room for manual penetration testing?
34:05 - summary and last words]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/Episode-18-photo.jpg"></itunes:image>
                                                                            <itunes:duration>00:38:08</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 17: How to do penetration testing in cloud application]]>
                </title>
                <pubDate>Sun, 02 Aug 2020 11:56:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-17-how-to-do-penetration-testing-in-cloud-application</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-17-how-to-do-penetration-testing-in-cloud-application</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: </span><span style="font-weight:400;">Oz Avenstein</span></p>
<p><span style="font-weight:400;">Guest Title: </span><span style="font-weight:400;"> </span><em><span style="font-weight:400;">Founder</span></em></p>
<p><span style="font-weight:400;">Company:  Avensec</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Penetration tests are one of the strongest controls that we use. It is testing the overall resilience of our application and allows us to be more confident in our workloads. But in the cloud era, cloud applications pen testing needs to be coordinated with the providers. In this episode we talk with Oz Avenstein, an application security expert, about the challenges of cloud penetration testing and how to do it correctly.</span></p>
<p><strong>Timing</strong><span style="font-weight:400;">:</span></p>
<p><span style="font-weight:400;">0.50 introducing our guest</span></p>
<p><span style="font-weight:400;">3.40 How is cloud penetration tests different from regular pen tests?</span></p>
<p><span style="font-weight:400;">5.01 elaborating about IaaS/PaaS particular pen test policies </span></p>
<p><span style="font-weight:400;">8.45 pen testing SaaS applications </span></p>
<p><span style="font-weight:400;">11.05 relaying on 3rd party pen testing</span></p>
<p><span style="font-weight:400;">12.02 cloud pen test considerations and phases</span></p>
<p><span style="font-weight:400;">17.35 the actual pen testing </span></p>
<p><span style="font-weight:400;">21.20 the reporting phase</span></p>
<p><span style="font-weight:400;">23.40 incorporating pen test into applications development cycle </span></p>
<p><span style="font-weight:400;">34:00 Summary and last words</span></p>
<p> </p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Oz Avenstein
Guest Title:  Founder
Company:  Avensec
Abstract
Penetration tests are one of the strongest controls that we use. It is testing the overall resilience of our application and allows us to be more confident in our workloads. But in the cloud era, cloud applications pen testing needs to be coordinated with the providers. In this episode we talk with Oz Avenstein, an application security expert, about the challenges of cloud penetration testing and how to do it correctly.
Timing:
0.50 introducing our guest
3.40 How is cloud penetration tests different from regular pen tests?
5.01 elaborating about IaaS/PaaS particular pen test policies 
8.45 pen testing SaaS applications 
11.05 relaying on 3rd party pen testing
12.02 cloud pen test considerations and phases
17.35 the actual pen testing 
21.20 the reporting phase
23.40 incorporating pen test into applications development cycle 
34:00 Summary and last words
 ]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 17: How to do penetration testing in cloud application]]>
                </itunes:title>
                                    <itunes:episode>17</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: </span><span style="font-weight:400;">Oz Avenstein</span></p>
<p><span style="font-weight:400;">Guest Title: </span><span style="font-weight:400;"> </span><em><span style="font-weight:400;">Founder</span></em></p>
<p><span style="font-weight:400;">Company:  Avensec</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Penetration tests are one of the strongest controls that we use. It is testing the overall resilience of our application and allows us to be more confident in our workloads. But in the cloud era, cloud applications pen testing needs to be coordinated with the providers. In this episode we talk with Oz Avenstein, an application security expert, about the challenges of cloud penetration testing and how to do it correctly.</span></p>
<p><strong>Timing</strong><span style="font-weight:400;">:</span></p>
<p><span style="font-weight:400;">0.50 introducing our guest</span></p>
<p><span style="font-weight:400;">3.40 How is cloud penetration tests different from regular pen tests?</span></p>
<p><span style="font-weight:400;">5.01 elaborating about IaaS/PaaS particular pen test policies </span></p>
<p><span style="font-weight:400;">8.45 pen testing SaaS applications </span></p>
<p><span style="font-weight:400;">11.05 relaying on 3rd party pen testing</span></p>
<p><span style="font-weight:400;">12.02 cloud pen test considerations and phases</span></p>
<p><span style="font-weight:400;">17.35 the actual pen testing </span></p>
<p><span style="font-weight:400;">21.20 the reporting phase</span></p>
<p><span style="font-weight:400;">23.40 incorporating pen test into applications development cycle </span></p>
<p><span style="font-weight:400;">34:00 Summary and last words</span></p>
<p> </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/silver-lining-ep-17-final.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-17-how-to-do-penetration-testing-in-cloud-application&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-17-how-to-do-penetration-testing-in-cloud-application&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=231fdd6c51b514fd35f95ae2082b555575187cfea1a7b63bd83189bdfe6d928e" length="35594660"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Oz Avenstein
Guest Title:  Founder
Company:  Avensec
Abstract
Penetration tests are one of the strongest controls that we use. It is testing the overall resilience of our application and allows us to be more confident in our workloads. But in the cloud era, cloud applications pen testing needs to be coordinated with the providers. In this episode we talk with Oz Avenstein, an application security expert, about the challenges of cloud penetration testing and how to do it correctly.
Timing:
0.50 introducing our guest
3.40 How is cloud penetration tests different from regular pen tests?
5.01 elaborating about IaaS/PaaS particular pen test policies 
8.45 pen testing SaaS applications 
11.05 relaying on 3rd party pen testing
12.02 cloud pen test considerations and phases
17.35 the actual pen testing 
21.20 the reporting phase
23.40 incorporating pen test into applications development cycle 
34:00 Summary and last words
 ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/Episdoe-17.jpg"></itunes:image>
                                                                            <itunes:duration>00:37:03</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 16: Merging Cloud Based Startup Into Financial Giants]]>
                </title>
                <pubDate>Wed, 12 Feb 2020 07:42:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-16-merging-cloud-based-startup-into-financial-giants-1</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-16-merging-cloud-based-startup-into-financial-giants-1</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Ori Troyna</span></p>
<p><span style="font-weight:400;">Guest title: </span><span style="font-weight:400;">Global head of product security at Payu</span></p>
<p><span style="font-weight:400;">Company: Payu</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Payu, a global fintech gaint acquired Zooz , a small payment startup.  In this episode we talk with Ori Troyna, Global head of product security at Payu about the challenges that such a merger between two very different companies with different engineering methodologies and how they cope with those challenges.</span></p>
<p><strong>Timing</strong><span style="font-weight:400;">:</span></p>
<p><span style="font-weight:400;">1.14 Ori introduce himself</span></p>
<p><span style="font-weight:400;">11.40 challenges of merging small companies into financial giants. Integrating different technologies stacks into one. </span></p>
<p><span style="font-weight:400;"> 18.33 how to build the organizational structure the consolidate the different companies and technology stacks</span></p>
<p><span style="font-weight:400;"> 21.30 understanding the acquisition considerations of PayU and its effect on security considerations </span></p>
<p><span style="font-weight:400;"> 27.0 solving the consolidation challenges - the people angel. Moving to tribes and clans and providing security goals</span></p>
<p><span style="font-weight:400;"> 34.30 the difference between product security and IT security </span></p>
<p><span style="font-weight:400;"> 36.0 solving the consolidation challenges - the process angel. How to integrate different tribes and clans to create one joint development backlog and mature devops </span></p>
<p><span style="font-weight:400;"> 46.40 solving the consolidation challenges - the technology angel. Building global infrastructure that support multiple projects </span></p>
<p><span style="font-weight:400;">53.22 summary and last words</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Ori Troyna
Guest title: Global head of product security at Payu
Company: Payu
Abstract
Payu, a global fintech gaint acquired Zooz , a small payment startup.  In this episode we talk with Ori Troyna, Global head of product security at Payu about the challenges that such a merger between two very different companies with different engineering methodologies and how they cope with those challenges.
Timing:
1.14 Ori introduce himself
11.40 challenges of merging small companies into financial giants. Integrating different technologies stacks into one. 
 18.33 how to build the organizational structure the consolidate the different companies and technology stacks
 21.30 understanding the acquisition considerations of PayU and its effect on security considerations 
 27.0 solving the consolidation challenges - the people angel. Moving to tribes and clans and providing security goals
 34.30 the difference between product security and IT security 
 36.0 solving the consolidation challenges - the process angel. How to integrate different tribes and clans to create one joint development backlog and mature devops 
 46.40 solving the consolidation challenges - the technology angel. Building global infrastructure that support multiple projects 
53.22 summary and last words]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 16: Merging Cloud Based Startup Into Financial Giants]]>
                </itunes:title>
                                    <itunes:episode>16</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Ori Troyna</span></p>
<p><span style="font-weight:400;">Guest title: </span><span style="font-weight:400;">Global head of product security at Payu</span></p>
<p><span style="font-weight:400;">Company: Payu</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Payu, a global fintech gaint acquired Zooz , a small payment startup.  In this episode we talk with Ori Troyna, Global head of product security at Payu about the challenges that such a merger between two very different companies with different engineering methodologies and how they cope with those challenges.</span></p>
<p><strong>Timing</strong><span style="font-weight:400;">:</span></p>
<p><span style="font-weight:400;">1.14 Ori introduce himself</span></p>
<p><span style="font-weight:400;">11.40 challenges of merging small companies into financial giants. Integrating different technologies stacks into one. </span></p>
<p><span style="font-weight:400;"> 18.33 how to build the organizational structure the consolidate the different companies and technology stacks</span></p>
<p><span style="font-weight:400;"> 21.30 understanding the acquisition considerations of PayU and its effect on security considerations </span></p>
<p><span style="font-weight:400;"> 27.0 solving the consolidation challenges - the people angel. Moving to tribes and clans and providing security goals</span></p>
<p><span style="font-weight:400;"> 34.30 the difference between product security and IT security </span></p>
<p><span style="font-weight:400;"> 36.0 solving the consolidation challenges - the process angel. How to integrate different tribes and clans to create one joint development backlog and mature devops </span></p>
<p><span style="font-weight:400;"> 46.40 solving the consolidation challenges - the technology angel. Building global infrastructure that support multiple projects </span></p>
<p><span style="font-weight:400;">53.22 summary and last words</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/silver-lining-16.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-16-merging-cloud-based-startup-into-financial-giants-1&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-16-merging-cloud-based-startup-into-financial-giants-1&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=b9c5b3a09741e3c8c83780ee79a6894447d3395cbd7c84a3917f6bec101c2f8c" length="54119461"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Ori Troyna
Guest title: Global head of product security at Payu
Company: Payu
Abstract
Payu, a global fintech gaint acquired Zooz , a small payment startup.  In this episode we talk with Ori Troyna, Global head of product security at Payu about the challenges that such a merger between two very different companies with different engineering methodologies and how they cope with those challenges.
Timing:
1.14 Ori introduce himself
11.40 challenges of merging small companies into financial giants. Integrating different technologies stacks into one. 
 18.33 how to build the organizational structure the consolidate the different companies and technology stacks
 21.30 understanding the acquisition considerations of PayU and its effect on security considerations 
 27.0 solving the consolidation challenges - the people angel. Moving to tribes and clans and providing security goals
 34.30 the difference between product security and IT security 
 36.0 solving the consolidation challenges - the process angel. How to integrate different tribes and clans to create one joint development backlog and mature devops 
 46.40 solving the consolidation challenges - the technology angel. Building global infrastructure that support multiple projects 
53.22 summary and last words]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/EP-16-PIC.jpg"></itunes:image>
                                                                            <itunes:duration>00:56:21</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 15: Challenges Of Selecting SaaS Providers]]>
                </title>
                <pubDate>Tue, 28 Jan 2020 08:27:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-15-challenges-of-selecting-saas-providers-1</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-15-challenges-of-selecting-saas-providers-1</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Tal Arad</span></p>
<p><span style="font-weight:400;">Guest title: F</span><span style="font-weight:400;">ormer </span><em><span style="font-weight:400;">CISO</span></em></p>
<p><span style="font-weight:400;">Company: CEVA logistics</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Consuming SaaS from various vendors can be a challenging task, the first challenge is to distinguish who are the mature providers that you can trust your data with, and the second challenge is auditing them and their services. In this episode we talk with Tal Arad, former CISO of CEVA logistics about the challenges of selecting SaaS providers and how to auditing them wisely.</span></p>
<p><strong>Timing</strong><span style="font-weight:400;">:</span></p>
<p><span style="font-weight:400;">0:35</span> <span style="font-weight:400;">introducing our guest</span></p>
<p><span style="font-weight:400;">02:30</span> <span style="font-weight:400;">Introducing Ceva Logistics and the CISO challenges</span></p>
<p><span style="font-weight:400;">5:55 </span> <span style="font-weight:400;">How to get started in as a new CISO </span></p>
<p><span style="font-weight:400;">9:20 </span> <span style="font-weight:400;">Challenges with SaaS providers - distinguishing between mature and immature</span></p>
<p><span style="font-weight:400;">Providers</span></p>
<p><span style="font-weight:400;">16:15</span> <span style="font-weight:400;">tips for selecting SaaS providers</span></p>
<p><span style="font-weight:400;">22:30</span> <span style="font-weight:400;">what happens when something happens and choosing providers carefully</span></p>
<p><span style="font-weight:400;">24:50</span> <span style="font-weight:400;">Tips for managing ongoing relationships with SaaS providers</span></p>
<p><span style="font-weight:400;">34:27 Summary and final words</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Tal Arad
Guest title: Former CISO
Company: CEVA logistics
Abstract
Consuming SaaS from various vendors can be a challenging task, the first challenge is to distinguish who are the mature providers that you can trust your data with, and the second challenge is auditing them and their services. In this episode we talk with Tal Arad, former CISO of CEVA logistics about the challenges of selecting SaaS providers and how to auditing them wisely.
Timing:
0:35 introducing our guest
02:30 Introducing Ceva Logistics and the CISO challenges
5:55  How to get started in as a new CISO 
9:20  Challenges with SaaS providers - distinguishing between mature and immature
Providers
16:15 tips for selecting SaaS providers
22:30 what happens when something happens and choosing providers carefully
24:50 Tips for managing ongoing relationships with SaaS providers
34:27 Summary and final words]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 15: Challenges Of Selecting SaaS Providers]]>
                </itunes:title>
                                    <itunes:episode>15</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Tal Arad</span></p>
<p><span style="font-weight:400;">Guest title: F</span><span style="font-weight:400;">ormer </span><em><span style="font-weight:400;">CISO</span></em></p>
<p><span style="font-weight:400;">Company: CEVA logistics</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Consuming SaaS from various vendors can be a challenging task, the first challenge is to distinguish who are the mature providers that you can trust your data with, and the second challenge is auditing them and their services. In this episode we talk with Tal Arad, former CISO of CEVA logistics about the challenges of selecting SaaS providers and how to auditing them wisely.</span></p>
<p><strong>Timing</strong><span style="font-weight:400;">:</span></p>
<p><span style="font-weight:400;">0:35</span> <span style="font-weight:400;">introducing our guest</span></p>
<p><span style="font-weight:400;">02:30</span> <span style="font-weight:400;">Introducing Ceva Logistics and the CISO challenges</span></p>
<p><span style="font-weight:400;">5:55 </span> <span style="font-weight:400;">How to get started in as a new CISO </span></p>
<p><span style="font-weight:400;">9:20 </span> <span style="font-weight:400;">Challenges with SaaS providers - distinguishing between mature and immature</span></p>
<p><span style="font-weight:400;">Providers</span></p>
<p><span style="font-weight:400;">16:15</span> <span style="font-weight:400;">tips for selecting SaaS providers</span></p>
<p><span style="font-weight:400;">22:30</span> <span style="font-weight:400;">what happens when something happens and choosing providers carefully</span></p>
<p><span style="font-weight:400;">24:50</span> <span style="font-weight:400;">Tips for managing ongoing relationships with SaaS providers</span></p>
<p><span style="font-weight:400;">34:27 Summary and final words</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/EPISODE-15.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-15-challenges-of-selecting-saas-providers-1&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-15-challenges-of-selecting-saas-providers-1&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=9c358ab3c392fdc9c1e920e1171c5a10ebb5c2042dfbc15bd48b324ba4bf7c0e" length="37242290"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Tal Arad
Guest title: Former CISO
Company: CEVA logistics
Abstract
Consuming SaaS from various vendors can be a challenging task, the first challenge is to distinguish who are the mature providers that you can trust your data with, and the second challenge is auditing them and their services. In this episode we talk with Tal Arad, former CISO of CEVA logistics about the challenges of selecting SaaS providers and how to auditing them wisely.
Timing:
0:35 introducing our guest
02:30 Introducing Ceva Logistics and the CISO challenges
5:55  How to get started in as a new CISO 
9:20  Challenges with SaaS providers - distinguishing between mature and immature
Providers
16:15 tips for selecting SaaS providers
22:30 what happens when something happens and choosing providers carefully
24:50 Tips for managing ongoing relationships with SaaS providers
34:27 Summary and final words]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/EP-15-PIC.jpg"></itunes:image>
                                                                            <itunes:duration>00:38:46</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 14: DevOps Secret Management]]>
                </title>
                <pubDate>Tue, 14 Jan 2020 15:32:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-14-devops-secret-management</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-14-devops-secret-management</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Oded Hareven</span></p>
<p><span style="font-weight:400;">Guest title: </span><span style="font-weight:400;"> Founder &amp; CEO</span></p>
<p><span style="font-weight:400;">Company:  A-Key-Less</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Application Secret management is becoming one of the biggest challenges for application security. With cloud, CI/CD and micro services architecture we discover that we are using a growing number of encryption keys, API keys, SSH keys tokens and connection strings. In this episode we talk with Oded HarEven, Founder at A-Key-Less about the challenges of secret management and the way to build secure secret management solution. </span></p>
<p><strong>Timing</strong></p>
<table>
<tbody>
<tr>
<td>
<p><span style="font-weight:400;">0:00</span></p>
</td>
<td>
<p><span style="font-weight:400;">Intro and introducing our guest</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">1:40</span></p>
</td>
<td>
<p><span style="font-weight:400;">Application secret management  - defining what secret is, and what is secret management</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">6.00 </span></p>
</td>
<td>
<p><span style="font-weight:400;">Challenges with encryption keys </span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">9:47  </span></p>
</td>
<td>
<p><span style="font-weight:400;">How to handle application secret management and encryption keys - requirements and best practices</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">12.25</span></p>
</td>
<td>
<p><span style="font-weight:400;">Zero trust in key management - what does it mean and how to implement it</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">20:10</span></p>
</td>
<td>
<p><span style="font-weight:400;">The process of integrating keys with cloud platform</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">25:35</span></p>
</td>
<td>
<p><span style="font-weight:400;">A-Key-Less state of the market approach</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">27.35</span></p>
</td>
<td>
<p><span style="font-weight:400;">Summary and conclusions</span></p>
</td>
</tr>
</tbody>
</table>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Oded Hareven
Guest title:  Founder & CEO
Company:  A-Key-Less
Abstract
Application Secret management is becoming one of the biggest challenges for application security. With cloud, CI/CD and micro services architecture we discover that we are using a growing number of encryption keys, API keys, SSH keys tokens and connection strings. In this episode we talk with Oded HarEven, Founder at A-Key-Less about the challenges of secret management and the way to build secure secret management solution. 
Timing




0:00


Intro and introducing our guest




1:40


Application secret management  - defining what secret is, and what is secret management




6.00 


Challenges with encryption keys 




9:47  


How to handle application secret management and encryption keys - requirements and best practices




12.25


Zero trust in key management - what does it mean and how to implement it




20:10


The process of integrating keys with cloud platform




25:35


A-Key-Less state of the market approach




27.35


Summary and conclusions



]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 14: DevOps Secret Management]]>
                </itunes:title>
                                    <itunes:episode>14</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Oded Hareven</span></p>
<p><span style="font-weight:400;">Guest title: </span><span style="font-weight:400;"> Founder &amp; CEO</span></p>
<p><span style="font-weight:400;">Company:  A-Key-Less</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Application Secret management is becoming one of the biggest challenges for application security. With cloud, CI/CD and micro services architecture we discover that we are using a growing number of encryption keys, API keys, SSH keys tokens and connection strings. In this episode we talk with Oded HarEven, Founder at A-Key-Less about the challenges of secret management and the way to build secure secret management solution. </span></p>
<p><strong>Timing</strong></p>
<table>
<tbody>
<tr>
<td>
<p><span style="font-weight:400;">0:00</span></p>
</td>
<td>
<p><span style="font-weight:400;">Intro and introducing our guest</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">1:40</span></p>
</td>
<td>
<p><span style="font-weight:400;">Application secret management  - defining what secret is, and what is secret management</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">6.00 </span></p>
</td>
<td>
<p><span style="font-weight:400;">Challenges with encryption keys </span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">9:47  </span></p>
</td>
<td>
<p><span style="font-weight:400;">How to handle application secret management and encryption keys - requirements and best practices</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">12.25</span></p>
</td>
<td>
<p><span style="font-weight:400;">Zero trust in key management - what does it mean and how to implement it</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">20:10</span></p>
</td>
<td>
<p><span style="font-weight:400;">The process of integrating keys with cloud platform</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">25:35</span></p>
</td>
<td>
<p><span style="font-weight:400;">A-Key-Less state of the market approach</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">27.35</span></p>
</td>
<td>
<p><span style="font-weight:400;">Summary and conclusions</span></p>
</td>
</tr>
</tbody>
</table>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/silver-lining-14.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-14-devops-secret-management&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-14-devops-secret-management&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=73e5c61df705843400836115f32f7826ee62a43f04c4641acb6b479949bf29c3" length="29556165"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Oded Hareven
Guest title:  Founder & CEO
Company:  A-Key-Less
Abstract
Application Secret management is becoming one of the biggest challenges for application security. With cloud, CI/CD and micro services architecture we discover that we are using a growing number of encryption keys, API keys, SSH keys tokens and connection strings. In this episode we talk with Oded HarEven, Founder at A-Key-Less about the challenges of secret management and the way to build secure secret management solution. 
Timing




0:00


Intro and introducing our guest




1:40


Application secret management  - defining what secret is, and what is secret management




6.00 


Challenges with encryption keys 




9:47  


How to handle application secret management and encryption keys - requirements and best practices




12.25


Zero trust in key management - what does it mean and how to implement it




20:10


The process of integrating keys with cloud platform




25:35


A-Key-Less state of the market approach




27.35


Summary and conclusions



]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/IMG-20190625-132030.jpg"></itunes:image>
                                                                            <itunes:duration>00:30:45</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 13: Creating Trust & Awareness]]>
                </title>
                <pubDate>Tue, 31 Dec 2019 12:47:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-13-creating-trust-awareness-1</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-13-creating-trust-awareness-1</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Vladi Sandler</span></p>
<p><span style="font-weight:400;">Guest title: </span><em><span style="font-weight:400;">Cloud Security team leader</span></em></p>
<p><span style="font-weight:400;">Company: cymotive.com</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Gaining trust and developing awareness with customers is one of the hardest challenges for providers. It is almost an art. In this episode we talk with Vladi Sandler from Cymotive about creating healthy relationships with customers and how a mixture of personal awareness and technical proficiency are crucial in the customer-provider relationships.</span></p>
<p><strong>Timing</strong><span style="font-weight:400;">:</span></p>
<p><span style="font-weight:400;">0:25</span> <span style="font-weight:400;">introducing our guest</span></p>
<p><span style="font-weight:400;">03:30</span> <span style="font-weight:400;">Introducing Cymotive  </span></p>
<p><span style="font-weight:400;">5:55 </span> <span style="font-weight:400;">Cymotive challenges with their market targets</span></p>
<p><span style="font-weight:400;">10:10 </span> <span style="font-weight:400;">relevant Security teams for protecting automotive </span></p>
<p><span style="font-weight:400;">11:50</span> <span style="font-weight:400;">The concepts of car security</span></p>
<p><span style="font-weight:400;">13:55</span> <span style="font-weight:400;">Challenges when creating trust - The people angle</span></p>
<p><span style="font-weight:400;">17:48</span> <span style="font-weight:400;">Challenges when creating trust - The process angle</span></p>
<p><span style="font-weight:400;">22:00</span> <span style="font-weight:400;">Challenges when creating trust - The technology angle</span></p>
<p><span style="font-weight:400;">27:50 Summary and final words</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Vladi Sandler
Guest title: Cloud Security team leader
Company: cymotive.com
Abstract
Gaining trust and developing awareness with customers is one of the hardest challenges for providers. It is almost an art. In this episode we talk with Vladi Sandler from Cymotive about creating healthy relationships with customers and how a mixture of personal awareness and technical proficiency are crucial in the customer-provider relationships.
Timing:
0:25 introducing our guest
03:30 Introducing Cymotive  
5:55  Cymotive challenges with their market targets
10:10  relevant Security teams for protecting automotive 
11:50 The concepts of car security
13:55 Challenges when creating trust - The people angle
17:48 Challenges when creating trust - The process angle
22:00 Challenges when creating trust - The technology angle
27:50 Summary and final words]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 13: Creating Trust & Awareness]]>
                </itunes:title>
                                    <itunes:episode>13</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Vladi Sandler</span></p>
<p><span style="font-weight:400;">Guest title: </span><em><span style="font-weight:400;">Cloud Security team leader</span></em></p>
<p><span style="font-weight:400;">Company: cymotive.com</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Gaining trust and developing awareness with customers is one of the hardest challenges for providers. It is almost an art. In this episode we talk with Vladi Sandler from Cymotive about creating healthy relationships with customers and how a mixture of personal awareness and technical proficiency are crucial in the customer-provider relationships.</span></p>
<p><strong>Timing</strong><span style="font-weight:400;">:</span></p>
<p><span style="font-weight:400;">0:25</span> <span style="font-weight:400;">introducing our guest</span></p>
<p><span style="font-weight:400;">03:30</span> <span style="font-weight:400;">Introducing Cymotive  </span></p>
<p><span style="font-weight:400;">5:55 </span> <span style="font-weight:400;">Cymotive challenges with their market targets</span></p>
<p><span style="font-weight:400;">10:10 </span> <span style="font-weight:400;">relevant Security teams for protecting automotive </span></p>
<p><span style="font-weight:400;">11:50</span> <span style="font-weight:400;">The concepts of car security</span></p>
<p><span style="font-weight:400;">13:55</span> <span style="font-weight:400;">Challenges when creating trust - The people angle</span></p>
<p><span style="font-weight:400;">17:48</span> <span style="font-weight:400;">Challenges when creating trust - The process angle</span></p>
<p><span style="font-weight:400;">22:00</span> <span style="font-weight:400;">Challenges when creating trust - The technology angle</span></p>
<p><span style="font-weight:400;">27:50 Summary and final words</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/silver-lining-13.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-13-creating-trust-awareness-1&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-13-creating-trust-awareness-1&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=8c9d91834fb1dca00846b1a01599a2b2d7b07c2b4a98de55b12b8d4e4b0048a5" length="30686225"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Vladi Sandler
Guest title: Cloud Security team leader
Company: cymotive.com
Abstract
Gaining trust and developing awareness with customers is one of the hardest challenges for providers. It is almost an art. In this episode we talk with Vladi Sandler from Cymotive about creating healthy relationships with customers and how a mixture of personal awareness and technical proficiency are crucial in the customer-provider relationships.
Timing:
0:25 introducing our guest
03:30 Introducing Cymotive  
5:55  Cymotive challenges with their market targets
10:10  relevant Security teams for protecting automotive 
11:50 The concepts of car security
13:55 Challenges when creating trust - The people angle
17:48 Challenges when creating trust - The process angle
22:00 Challenges when creating trust - The technology angle
27:50 Summary and final words]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/EP-13-PIC.jpg"></itunes:image>
                                                                            <itunes:duration>00:31:56</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 12: Diving Into Authorization And Policy Bases Access Controls]]>
                </title>
                <pubDate>Tue, 10 Dec 2019 09:39:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-12-diving-into-authorization-and-policy-bases-access-controls-1</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-12-diving-into-authorization-and-policy-bases-access-controls-1</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Tsachi Lutaty</span></p>
<p><span style="font-weight:400;">Guest title: </span><em><span style="font-weight:400;">R&amp;D manager</span></em></p>
<p><span style="font-weight:400;">Company: PlainID</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">In the past years we have reached important progress in authentication. Multi factor authentication and Identity  Federation solved many of the identity authentication challenges. So it is now time to focus on the second aspect of Identity &amp; Access Management - the aspect of Identity Authorization.  In this podcast we are talking with Tsachi Lutaty, R&amp;D manager for PlainID, about the move from Role based access controls to Policy based access controls and how organizations can better engineer their authorization scheme and policies.</span></p>
<p><strong>Timing</strong><span style="font-weight:400;">:</span></p>
<p><span style="font-weight:400;">0:41</span> <span style="font-weight:400;">introducing our guest</span></p>
<p><span style="font-weight:400;">1:25</span> <span style="font-weight:400;">Introducing PlainID </span></p>
<p><span style="font-weight:400;">2:45 </span> <span style="font-weight:400;">Authorization challenges - what are modern authorization challenges</span></p>
<p><span style="font-weight:400;">8:00</span> <span style="font-weight:400;">Role based access control vs. Attribute / Policy  based access control </span></p>
<p><span style="font-weight:400;">15:30</span> <span style="font-weight:400;">Existing authorization standards  </span></p>
<p><span style="font-weight:400;">18:58</span> <span style="font-weight:400;">How can we better engineer authorization system - The technology angle</span></p>
<p><span style="font-weight:400;">26:15</span> <span style="font-weight:400;">How can we better engineer authorization system - The process angle</span></p>
<p><span style="font-weight:400;">29:30</span> <span style="font-weight:400;">How can we better engineer authorization system - The people angle</span></p>
<p><span style="font-weight:400;">32:50 Summary and final words</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Tsachi Lutaty
Guest title: R&D manager
Company: PlainID
Abstract
In the past years we have reached important progress in authentication. Multi factor authentication and Identity  Federation solved many of the identity authentication challenges. So it is now time to focus on the second aspect of Identity & Access Management - the aspect of Identity Authorization.  In this podcast we are talking with Tsachi Lutaty, R&D manager for PlainID, about the move from Role based access controls to Policy based access controls and how organizations can better engineer their authorization scheme and policies.
Timing:
0:41 introducing our guest
1:25 Introducing PlainID 
2:45  Authorization challenges - what are modern authorization challenges
8:00 Role based access control vs. Attribute / Policy  based access control 
15:30 Existing authorization standards  
18:58 How can we better engineer authorization system - The technology angle
26:15 How can we better engineer authorization system - The process angle
29:30 How can we better engineer authorization system - The people angle
32:50 Summary and final words]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 12: Diving Into Authorization And Policy Bases Access Controls]]>
                </itunes:title>
                                    <itunes:episode>12</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Tsachi Lutaty</span></p>
<p><span style="font-weight:400;">Guest title: </span><em><span style="font-weight:400;">R&amp;D manager</span></em></p>
<p><span style="font-weight:400;">Company: PlainID</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">In the past years we have reached important progress in authentication. Multi factor authentication and Identity  Federation solved many of the identity authentication challenges. So it is now time to focus on the second aspect of Identity &amp; Access Management - the aspect of Identity Authorization.  In this podcast we are talking with Tsachi Lutaty, R&amp;D manager for PlainID, about the move from Role based access controls to Policy based access controls and how organizations can better engineer their authorization scheme and policies.</span></p>
<p><strong>Timing</strong><span style="font-weight:400;">:</span></p>
<p><span style="font-weight:400;">0:41</span> <span style="font-weight:400;">introducing our guest</span></p>
<p><span style="font-weight:400;">1:25</span> <span style="font-weight:400;">Introducing PlainID </span></p>
<p><span style="font-weight:400;">2:45 </span> <span style="font-weight:400;">Authorization challenges - what are modern authorization challenges</span></p>
<p><span style="font-weight:400;">8:00</span> <span style="font-weight:400;">Role based access control vs. Attribute / Policy  based access control </span></p>
<p><span style="font-weight:400;">15:30</span> <span style="font-weight:400;">Existing authorization standards  </span></p>
<p><span style="font-weight:400;">18:58</span> <span style="font-weight:400;">How can we better engineer authorization system - The technology angle</span></p>
<p><span style="font-weight:400;">26:15</span> <span style="font-weight:400;">How can we better engineer authorization system - The process angle</span></p>
<p><span style="font-weight:400;">29:30</span> <span style="font-weight:400;">How can we better engineer authorization system - The people angle</span></p>
<p><span style="font-weight:400;">32:50 Summary and final words</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/silver-lining-12.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-12-diving-into-authorization-and-policy-bases-access-controls-1&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-12-diving-into-authorization-and-policy-bases-access-controls-1&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=03507f87a97d5650b17994cc36a78f9cd6ea6fe6ca45977258b6525ed5948fa3" length="34094365"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Tsachi Lutaty
Guest title: R&D manager
Company: PlainID
Abstract
In the past years we have reached important progress in authentication. Multi factor authentication and Identity  Federation solved many of the identity authentication challenges. So it is now time to focus on the second aspect of Identity & Access Management - the aspect of Identity Authorization.  In this podcast we are talking with Tsachi Lutaty, R&D manager for PlainID, about the move from Role based access controls to Policy based access controls and how organizations can better engineer their authorization scheme and policies.
Timing:
0:41 introducing our guest
1:25 Introducing PlainID 
2:45  Authorization challenges - what are modern authorization challenges
8:00 Role based access control vs. Attribute / Policy  based access control 
15:30 Existing authorization standards  
18:58 How can we better engineer authorization system - The technology angle
26:15 How can we better engineer authorization system - The process angle
29:30 How can we better engineer authorization system - The people angle
32:50 Summary and final words]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/EP-13-PIC.jpg"></itunes:image>
                                                                            <itunes:duration>00:35:29</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 11: IoT Security Basics]]>
                </title>
                <pubDate>Tue, 26 Nov 2019 13:40:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-11-iot-security-basics</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-11-iot-security-basics</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Eliav Gnessin</span></p>
<p><span style="font-weight:400;">Guest title: </span><span style="font-weight:400;">CTO</span></p>
<p><span style="font-weight:400;">Company: DeviceTone</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;"> IOT present one of the hottest topics in the industry today. In this episode we talk with Eliav Gnessin, CTO for DeviceTone, about securely engineering IOT solution end to end. During the episode Eliav guides us through IOT journey starting from the chipset of the device itself and all the way up to the IOT cloud based management. Eliav will explain about different implementations consideration, latest developments in the market and the efforts made by chipmakers &amp; cloud provider to create more secure IOT.</span></p>
<p><strong>Timing</strong></p>
<table>
<tbody>
<tr>
<td>
<p><span style="font-weight:400;">0:00</span></p>
</td>
<td>
<p><span style="font-weight:400;">Intro and introducing Eliev and DeviceTone</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">2:05</span></p>
</td>
<td>
<p><span style="font-weight:400;">Why is it so hard to built secure IOT solutions?</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">9.00 </span></p>
</td>
<td>
<p><span style="font-weight:400;">How to properly build an IOT solutions: the technology angle </span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">18:50  </span></p>
</td>
<td>
<p><span style="font-weight:400;">How to properly build an IOT solutions: the people angle</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">22.40</span></p>
</td>
<td>
<p><span style="font-weight:400;">How to properly build an IOT solutions: the process angle</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">28:10</span></p>
</td>
<td>
<p><span style="font-weight:400;">Doing over-the-air updates</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">31:40</span></p>
</td>
<td>
<p><span style="font-weight:400;">The different approaches to IOT coming from the cloud providers</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">38.20</span></p>
</td>
<td>
<p><span style="font-weight:400;">Tips to IOT developers</span></p>
</td>
</tr>
</tbody>
</table>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Eliav Gnessin
Guest title: CTO
Company: DeviceTone
Abstract
 IOT present one of the hottest topics in the industry today. In this episode we talk with Eliav Gnessin, CTO for DeviceTone, about securely engineering IOT solution end to end. During the episode Eliav guides us through IOT journey starting from the chipset of the device itself and all the way up to the IOT cloud based management. Eliav will explain about different implementations consideration, latest developments in the market and the efforts made by chipmakers & cloud provider to create more secure IOT.
Timing




0:00


Intro and introducing Eliev and DeviceTone




2:05


Why is it so hard to built secure IOT solutions?




9.00 


How to properly build an IOT solutions: the technology angle 




18:50  


How to properly build an IOT solutions: the people angle




22.40


How to properly build an IOT solutions: the process angle




28:10


Doing over-the-air updates




31:40


The different approaches to IOT coming from the cloud providers




38.20


Tips to IOT developers



]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 11: IoT Security Basics]]>
                </itunes:title>
                                    <itunes:episode>11</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Eliav Gnessin</span></p>
<p><span style="font-weight:400;">Guest title: </span><span style="font-weight:400;">CTO</span></p>
<p><span style="font-weight:400;">Company: DeviceTone</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;"> IOT present one of the hottest topics in the industry today. In this episode we talk with Eliav Gnessin, CTO for DeviceTone, about securely engineering IOT solution end to end. During the episode Eliav guides us through IOT journey starting from the chipset of the device itself and all the way up to the IOT cloud based management. Eliav will explain about different implementations consideration, latest developments in the market and the efforts made by chipmakers &amp; cloud provider to create more secure IOT.</span></p>
<p><strong>Timing</strong></p>
<table>
<tbody>
<tr>
<td>
<p><span style="font-weight:400;">0:00</span></p>
</td>
<td>
<p><span style="font-weight:400;">Intro and introducing Eliev and DeviceTone</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">2:05</span></p>
</td>
<td>
<p><span style="font-weight:400;">Why is it so hard to built secure IOT solutions?</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">9.00 </span></p>
</td>
<td>
<p><span style="font-weight:400;">How to properly build an IOT solutions: the technology angle </span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">18:50  </span></p>
</td>
<td>
<p><span style="font-weight:400;">How to properly build an IOT solutions: the people angle</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">22.40</span></p>
</td>
<td>
<p><span style="font-weight:400;">How to properly build an IOT solutions: the process angle</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">28:10</span></p>
</td>
<td>
<p><span style="font-weight:400;">Doing over-the-air updates</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">31:40</span></p>
</td>
<td>
<p><span style="font-weight:400;">The different approaches to IOT coming from the cloud providers</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">38.20</span></p>
</td>
<td>
<p><span style="font-weight:400;">Tips to IOT developers</span></p>
</td>
</tr>
</tbody>
</table>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/silver-lining-11.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-11-iot-security-basics&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-11-iot-security-basics&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=f88d163261c9270a00d917381cb68e565914abb2a30e94b5349699487c9acd98" length="41709592"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Eliav Gnessin
Guest title: CTO
Company: DeviceTone
Abstract
 IOT present one of the hottest topics in the industry today. In this episode we talk with Eliav Gnessin, CTO for DeviceTone, about securely engineering IOT solution end to end. During the episode Eliav guides us through IOT journey starting from the chipset of the device itself and all the way up to the IOT cloud based management. Eliav will explain about different implementations consideration, latest developments in the market and the efforts made by chipmakers & cloud provider to create more secure IOT.
Timing




0:00


Intro and introducing Eliev and DeviceTone




2:05


Why is it so hard to built secure IOT solutions?




9.00 


How to properly build an IOT solutions: the technology angle 




18:50  


How to properly build an IOT solutions: the people angle




22.40


How to properly build an IOT solutions: the process angle




28:10


Doing over-the-air updates




31:40


The different approaches to IOT coming from the cloud providers




38.20


Tips to IOT developers



]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/EP-11-PIC.jpg"></itunes:image>
                                                                            <itunes:duration>00:43:25</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 10: Securing The New Fintech Economy]]>
                </title>
                <pubDate>Sun, 24 Nov 2019 15:07:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-10-securing-the-new-fintech-economy-1</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-10-securing-the-new-fintech-economy-1</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Nir Valtman</span></p>
<p><span style="font-weight:400;">Guest title: </span><span style="font-weight:400;"> Product security lead</span></p>
<p><span style="font-weight:400;">Company:  Finastra</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Fintech companies drive cloud security forward by setting the highest bar of requirements on cloud providers. In this episode we talk with Nir Valtman, Product security leader at Finastra about the challenges of Fintech companies and dive into API Authentication and Authorization best practices and building eco-system that can support trust between banks and young fintech companies.</span></p>
<p><strong>Timing</strong></p>
<table>
<tbody>
<tr>
<td>
<p><span style="font-weight:400;">0:00</span></p>
</td>
<td>
<p><span style="font-weight:400;">Intro and introducing our guest</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">2:40</span></p>
</td>
<td>
<p><span style="font-weight:400;">Introducing Finastra and the challenges of traditional banks with modern fintech. </span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">4.50 </span></p>
</td>
<td>
<p><span style="font-weight:400;">Building API platforms for banks. Challenges, security considerations and solutions. </span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">8:45  </span></p>
</td>
<td>
<p><span style="font-weight:400;">Creating trust between banks and fintech companies - validating applications end to end security from the fintech to the banks.</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">12.30</span></p>
</td>
<td>
<p><span style="font-weight:400;">Authenticating &amp; Authorizing API requests on banking platforms. Methods, challenges and common use cases</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">19:30</span></p>
</td>
<td>
<p><span style="font-weight:400;">Detecting anomalies detection and analyzing API’s on top of cloud platforms</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">25:35</span></p>
</td>
<td>
<p><span style="font-weight:400;">The challenges of application secret management with partners</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">28.25</span></p>
</td>
<td>
<p><span style="font-weight:400;">Tips for fintech companies</span></p>
</td>
</tr>
</tbody>
</table>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Nir Valtman
Guest title:  Product security lead
Company:  Finastra
Abstract
Fintech companies drive cloud security forward by setting the highest bar of requirements on cloud providers. In this episode we talk with Nir Valtman, Product security leader at Finastra about the challenges of Fintech companies and dive into API Authentication and Authorization best practices and building eco-system that can support trust between banks and young fintech companies.
Timing




0:00


Intro and introducing our guest




2:40


Introducing Finastra and the challenges of traditional banks with modern fintech. 




4.50 


Building API platforms for banks. Challenges, security considerations and solutions. 




8:45  


Creating trust between banks and fintech companies - validating applications end to end security from the fintech to the banks.




12.30


Authenticating & Authorizing API requests on banking platforms. Methods, challenges and common use cases




19:30


Detecting anomalies detection and analyzing API’s on top of cloud platforms




25:35


The challenges of application secret management with partners




28.25


Tips for fintech companies



]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 10: Securing The New Fintech Economy]]>
                </itunes:title>
                                    <itunes:episode>10</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Nir Valtman</span></p>
<p><span style="font-weight:400;">Guest title: </span><span style="font-weight:400;"> Product security lead</span></p>
<p><span style="font-weight:400;">Company:  Finastra</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Fintech companies drive cloud security forward by setting the highest bar of requirements on cloud providers. In this episode we talk with Nir Valtman, Product security leader at Finastra about the challenges of Fintech companies and dive into API Authentication and Authorization best practices and building eco-system that can support trust between banks and young fintech companies.</span></p>
<p><strong>Timing</strong></p>
<table>
<tbody>
<tr>
<td>
<p><span style="font-weight:400;">0:00</span></p>
</td>
<td>
<p><span style="font-weight:400;">Intro and introducing our guest</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">2:40</span></p>
</td>
<td>
<p><span style="font-weight:400;">Introducing Finastra and the challenges of traditional banks with modern fintech. </span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">4.50 </span></p>
</td>
<td>
<p><span style="font-weight:400;">Building API platforms for banks. Challenges, security considerations and solutions. </span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">8:45  </span></p>
</td>
<td>
<p><span style="font-weight:400;">Creating trust between banks and fintech companies - validating applications end to end security from the fintech to the banks.</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">12.30</span></p>
</td>
<td>
<p><span style="font-weight:400;">Authenticating &amp; Authorizing API requests on banking platforms. Methods, challenges and common use cases</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">19:30</span></p>
</td>
<td>
<p><span style="font-weight:400;">Detecting anomalies detection and analyzing API’s on top of cloud platforms</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">25:35</span></p>
</td>
<td>
<p><span style="font-weight:400;">The challenges of application secret management with partners</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">28.25</span></p>
</td>
<td>
<p><span style="font-weight:400;">Tips for fintech companies</span></p>
</td>
</tr>
</tbody>
</table>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/silver-lining-10.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-10-securing-the-new-fintech-economy-1&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-10-securing-the-new-fintech-economy-1&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=51bb07972663e72f54bb17e9f7f47488fba40e5a230bad821b0a833d07346149" length="29213809"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Nir Valtman
Guest title:  Product security lead
Company:  Finastra
Abstract
Fintech companies drive cloud security forward by setting the highest bar of requirements on cloud providers. In this episode we talk with Nir Valtman, Product security leader at Finastra about the challenges of Fintech companies and dive into API Authentication and Authorization best practices and building eco-system that can support trust between banks and young fintech companies.
Timing




0:00


Intro and introducing our guest




2:40


Introducing Finastra and the challenges of traditional banks with modern fintech. 




4.50 


Building API platforms for banks. Challenges, security considerations and solutions. 




8:45  


Creating trust between banks and fintech companies - validating applications end to end security from the fintech to the banks.




12.30


Authenticating & Authorizing API requests on banking platforms. Methods, challenges and common use cases




19:30


Detecting anomalies detection and analyzing API’s on top of cloud platforms




25:35


The challenges of application secret management with partners




28.25


Tips for fintech companies



]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/EP-10-PIC.jpg"></itunes:image>
                                                                            <itunes:duration>00:30:24</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 9: Challenges With Cloud Management Logs]]>
                </title>
                <pubDate>Tue, 29 Oct 2019 09:47:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-9-challenges-with-cloud-management-logs-1</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-9-challenges-with-cloud-management-logs-1</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Shira Shamban</span></p>
<p><span style="font-weight:400;">Guest title: </span><span style="font-weight:400;"> Cloud Security</span></p>
<p><span style="font-weight:400;">Company:  Check Point (Dome9)</span></p>
<p>Cloud providers has invested heavily in adding visibility, monitoring and logging capabilities of networking and administrative activities. In this session with talk with Shira Shamban, a cloud security expert from Check Point about the challenges of collecting the different logs exist in cloud platforms and the challenges of gaining insights from them.</p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Cloud providers has invested heavily in adding visibility, monitoring and logging capabilities of networking  and administrative activities. In this session with talk with Shira Shamban, a cloud security expert from Check Point about the challenges of collecting the different logs exist in cloud platforms  and the challenges of gaining insights from them.</span></p>
<table>
<tbody>
<tr>
<td>
<p><span style="font-weight:400;"> 0:00</span></p>
</td>
<td>
<p><span style="font-weight:400;">Introducing Shira and her activities in CheckPoint and community activities (Security-Diva, CSA Top Threat working group, OWASP-IL) </span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">11:55</span></p>
</td>
<td>
<p><span style="font-weight:400;">Introducing the challenges of cloud log management: enabling correctly,  long term storage, analysis challenges, lack of info </span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">19.45 </span></p>
</td>
<td>
<p><span style="font-weight:400;">The challenges of monitoring cloud assets using IP addresses </span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">21:25  </span></p>
</td>
<td>
<p><span style="font-weight:400;">How to properly do cloud based log collection: Enrichment, external threat service</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">24.20</span></p>
</td>
<td>
<p><span style="font-weight:400;">Values of log visualization </span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">28.05</span></p>
</td>
<td>
<p><span style="font-weight:400;">Log storage management</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">31:21</span></p>
</td>
<td>
<p><span style="font-weight:400;">Summary and last words</span></p>
</td>
</tr>
</tbody>
</table>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Shira Shamban
Guest title:  Cloud Security
Company:  Check Point (Dome9)
Cloud providers has invested heavily in adding visibility, monitoring and logging capabilities of networking and administrative activities. In this session with talk with Shira Shamban, a cloud security expert from Check Point about the challenges of collecting the different logs exist in cloud platforms and the challenges of gaining insights from them.
Abstract
Cloud providers has invested heavily in adding visibility, monitoring and logging capabilities of networking  and administrative activities. In this session with talk with Shira Shamban, a cloud security expert from Check Point about the challenges of collecting the different logs exist in cloud platforms  and the challenges of gaining insights from them.




 0:00


Introducing Shira and her activities in CheckPoint and community activities (Security-Diva, CSA Top Threat working group, OWASP-IL) 




11:55


Introducing the challenges of cloud log management: enabling correctly,  long term storage, analysis challenges, lack of info 




19.45 


The challenges of monitoring cloud assets using IP addresses 




21:25  


How to properly do cloud based log collection: Enrichment, external threat service




24.20


Values of log visualization 




28.05


Log storage management




31:21


Summary and last words



]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 9: Challenges With Cloud Management Logs]]>
                </itunes:title>
                                    <itunes:episode>9</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Shira Shamban</span></p>
<p><span style="font-weight:400;">Guest title: </span><span style="font-weight:400;"> Cloud Security</span></p>
<p><span style="font-weight:400;">Company:  Check Point (Dome9)</span></p>
<p>Cloud providers has invested heavily in adding visibility, monitoring and logging capabilities of networking and administrative activities. In this session with talk with Shira Shamban, a cloud security expert from Check Point about the challenges of collecting the different logs exist in cloud platforms and the challenges of gaining insights from them.</p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Cloud providers has invested heavily in adding visibility, monitoring and logging capabilities of networking  and administrative activities. In this session with talk with Shira Shamban, a cloud security expert from Check Point about the challenges of collecting the different logs exist in cloud platforms  and the challenges of gaining insights from them.</span></p>
<table>
<tbody>
<tr>
<td>
<p><span style="font-weight:400;"> 0:00</span></p>
</td>
<td>
<p><span style="font-weight:400;">Introducing Shira and her activities in CheckPoint and community activities (Security-Diva, CSA Top Threat working group, OWASP-IL) </span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">11:55</span></p>
</td>
<td>
<p><span style="font-weight:400;">Introducing the challenges of cloud log management: enabling correctly,  long term storage, analysis challenges, lack of info </span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">19.45 </span></p>
</td>
<td>
<p><span style="font-weight:400;">The challenges of monitoring cloud assets using IP addresses </span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">21:25  </span></p>
</td>
<td>
<p><span style="font-weight:400;">How to properly do cloud based log collection: Enrichment, external threat service</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">24.20</span></p>
</td>
<td>
<p><span style="font-weight:400;">Values of log visualization </span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">28.05</span></p>
</td>
<td>
<p><span style="font-weight:400;">Log storage management</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">31:21</span></p>
</td>
<td>
<p><span style="font-weight:400;">Summary and last words</span></p>
</td>
</tr>
</tbody>
</table>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/silver-lining-09.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-9-challenges-with-cloud-management-logs-1&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-9-challenges-with-cloud-management-logs-1&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=9c1b22f4ec24fea00c297d0afea0ffda559cdfe2edafac571ce90c8ea3006e1f" length="33640252"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Shira Shamban
Guest title:  Cloud Security
Company:  Check Point (Dome9)
Cloud providers has invested heavily in adding visibility, monitoring and logging capabilities of networking and administrative activities. In this session with talk with Shira Shamban, a cloud security expert from Check Point about the challenges of collecting the different logs exist in cloud platforms and the challenges of gaining insights from them.
Abstract
Cloud providers has invested heavily in adding visibility, monitoring and logging capabilities of networking  and administrative activities. In this session with talk with Shira Shamban, a cloud security expert from Check Point about the challenges of collecting the different logs exist in cloud platforms  and the challenges of gaining insights from them.




 0:00


Introducing Shira and her activities in CheckPoint and community activities (Security-Diva, CSA Top Threat working group, OWASP-IL) 




11:55


Introducing the challenges of cloud log management: enabling correctly,  long term storage, analysis challenges, lack of info 




19.45 


The challenges of monitoring cloud assets using IP addresses 




21:25  


How to properly do cloud based log collection: Enrichment, external threat service




24.20


Values of log visualization 




28.05


Log storage management




31:21


Summary and last words



]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/EP-9-PIC.jpg"></itunes:image>
                                                                            <itunes:duration>00:35:01</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 8: Securing The World of IoT]]>
                </title>
                <pubDate>Tue, 24 Sep 2019 12:55:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-8-securing-the-world-of-iot-1</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-8-securing-the-world-of-iot-1</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Beau Woods</span></p>
<p><span style="font-weight:400;">Guest title: </span><span style="font-weight:400;"> Member</span></p>
<p><span style="font-weight:400;">Company:  We-Are-The-Cavalry, Atlantic Council</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">IOT devices such as Medical embedded devices, autonomous vehicle and smart homes are currently the Achilles heel of information security. The technology is advancing fast, but the security frameworks are not advancing at the same pace. In this episode we talk with Beau woods, founder for I-am-the-cavalry, about the steps governments, regulators and vendors should take in order to produce safer IOT devices.</span></p>
<p><span style="font-weight:400;">Timing</span></p>
<p><span style="font-weight:400;"> </span></p>
<table>
<tbody>
<tr>
<td>
<p><span style="font-weight:400;">0:00</span></p>
</td>
<td>
<p><span style="font-weight:400;">Intro and introducing our Beau activities and I-AM-The-Cavalry community  </span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">5:20</span></p>
</td>
<td>
<p><span style="font-weight:400;">What are the unique challenges of IOT security? </span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">9.05 </span></p>
</td>
<td>
<p><span style="font-weight:400;">It is not a question of connectivity</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">11:35  </span></p>
</td>
<td>
<p><span style="font-weight:400;">How do better engineer IOT devices - fail fast, detect failure and maintain an ability to fix failures</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">17.15</span></p>
</td>
<td>
<p><span style="font-weight:400;">Engineering is not enough - how the IOT consumers should be trained for and aware of</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">22.20</span></p>
</td>
<td>
<p><span style="font-weight:400;">Summary and conclusions</span></p>
</td>
</tr>
</tbody>
</table>
<p> </p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Beau Woods
Guest title:  Member
Company:  We-Are-The-Cavalry, Atlantic Council
Abstract
IOT devices such as Medical embedded devices, autonomous vehicle and smart homes are currently the Achilles heel of information security. The technology is advancing fast, but the security frameworks are not advancing at the same pace. In this episode we talk with Beau woods, founder for I-am-the-cavalry, about the steps governments, regulators and vendors should take in order to produce safer IOT devices.
Timing
 




0:00


Intro and introducing our Beau activities and I-AM-The-Cavalry community  




5:20


What are the unique challenges of IOT security? 




9.05 


It is not a question of connectivity




11:35  


How do better engineer IOT devices - fail fast, detect failure and maintain an ability to fix failures




17.15


Engineering is not enough - how the IOT consumers should be trained for and aware of




22.20


Summary and conclusions




 ]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 8: Securing The World of IoT]]>
                </itunes:title>
                                    <itunes:episode>8</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Beau Woods</span></p>
<p><span style="font-weight:400;">Guest title: </span><span style="font-weight:400;"> Member</span></p>
<p><span style="font-weight:400;">Company:  We-Are-The-Cavalry, Atlantic Council</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">IOT devices such as Medical embedded devices, autonomous vehicle and smart homes are currently the Achilles heel of information security. The technology is advancing fast, but the security frameworks are not advancing at the same pace. In this episode we talk with Beau woods, founder for I-am-the-cavalry, about the steps governments, regulators and vendors should take in order to produce safer IOT devices.</span></p>
<p><span style="font-weight:400;">Timing</span></p>
<p><span style="font-weight:400;"> </span></p>
<table>
<tbody>
<tr>
<td>
<p><span style="font-weight:400;">0:00</span></p>
</td>
<td>
<p><span style="font-weight:400;">Intro and introducing our Beau activities and I-AM-The-Cavalry community  </span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">5:20</span></p>
</td>
<td>
<p><span style="font-weight:400;">What are the unique challenges of IOT security? </span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">9.05 </span></p>
</td>
<td>
<p><span style="font-weight:400;">It is not a question of connectivity</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">11:35  </span></p>
</td>
<td>
<p><span style="font-weight:400;">How do better engineer IOT devices - fail fast, detect failure and maintain an ability to fix failures</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">17.15</span></p>
</td>
<td>
<p><span style="font-weight:400;">Engineering is not enough - how the IOT consumers should be trained for and aware of</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">22.20</span></p>
</td>
<td>
<p><span style="font-weight:400;">Summary and conclusions</span></p>
</td>
</tr>
</tbody>
</table>
<p> </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/silver-lining-08.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-8-securing-the-world-of-iot-1&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-8-securing-the-world-of-iot-1&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=91cce98449aab2495c9344d711efa067f6042a424623223d986e24aa84fa76b5" length="26362363"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Beau Woods
Guest title:  Member
Company:  We-Are-The-Cavalry, Atlantic Council
Abstract
IOT devices such as Medical embedded devices, autonomous vehicle and smart homes are currently the Achilles heel of information security. The technology is advancing fast, but the security frameworks are not advancing at the same pace. In this episode we talk with Beau woods, founder for I-am-the-cavalry, about the steps governments, regulators and vendors should take in order to produce safer IOT devices.
Timing
 




0:00


Intro and introducing our Beau activities and I-AM-The-Cavalry community  




5:20


What are the unique challenges of IOT security? 




9.05 


It is not a question of connectivity




11:35  


How do better engineer IOT devices - fail fast, detect failure and maintain an ability to fix failures




17.15


Engineering is not enough - how the IOT consumers should be trained for and aware of




22.20


Summary and conclusions




 ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/EP-8-PIC.jpg"></itunes:image>
                                                                            <itunes:duration>00:27:26</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 7: Creating Trust in Cloud]]>
                </title>
                <pubDate>Mon, 02 Sep 2019 14:01:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-7-creating-trust-in-cloud</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-7-creating-trust-in-cloud</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Damir Savanović</span></p>
<p><span style="font-weight:400;">Guest title: </span><span style="font-weight:400;">Senior researcher</span></p>
<p><span style="font-weight:400;">Company: Cloud Security Alliance</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Creating trust is one of the major challenges for cloud providers and consumers, without trust customers will not be able to move workloads into cloud environments, but trust is a very elusive term that is hard to achieve. In  this episode we talk with Damir Savanović from the Cloud Security Alliance on how cloud providers and consumers can use certifications for increasing trust and how is CSA preparing to the new requirements of continuous monitoring that are arriving with the new EU cyber laws.</span></p>
<p><strong>Timing</strong></p>
<table>
<tbody>
<tr>
<td>
<p><span style="font-weight:400;">0:00</span></p>
</td>
<td>
<p><span style="font-weight:400;">Intro and introducing our guest and overview of Damir activities in the area of cloud security</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">5:40</span></p>
</td>
<td>
<p><span style="font-weight:400;">Introducing Cloud Security Alliance activities and major projects (STAR and CCSK)</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">9.17 </span></p>
</td>
<td>
<p><span style="font-weight:400;">The true meaning of trust in cloud computing. Using attestation and certification for establishing trust</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">14:50  </span></p>
</td>
<td>
<p><span style="font-weight:400;">The difference between certification and attestation and the effect of the new EU cybersecurity law on compliance</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">17.50</span></p>
</td>
<td>
<p><span style="font-weight:400;">Understanding CSA STAR methodology from self assessment to certification or attestation and continuous monitoring</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">24.20</span></p>
</td>
<td>
<p><span style="font-weight:400;">Behind the scenes of continuous monitoring - the CSA STAR methodology </span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">32.00</span></p>
</td>
<td>
<p><span style="font-weight:400;">Summary and conclusions</span></p>
</td>
</tr>
</tbody>
</table>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Damir Savanović
Guest title: Senior researcher
Company: Cloud Security Alliance
Abstract
Creating trust is one of the major challenges for cloud providers and consumers, without trust customers will not be able to move workloads into cloud environments, but trust is a very elusive term that is hard to achieve. In  this episode we talk with Damir Savanović from the Cloud Security Alliance on how cloud providers and consumers can use certifications for increasing trust and how is CSA preparing to the new requirements of continuous monitoring that are arriving with the new EU cyber laws.
Timing




0:00


Intro and introducing our guest and overview of Damir activities in the area of cloud security




5:40


Introducing Cloud Security Alliance activities and major projects (STAR and CCSK)




9.17 


The true meaning of trust in cloud computing. Using attestation and certification for establishing trust




14:50  


The difference between certification and attestation and the effect of the new EU cybersecurity law on compliance




17.50


Understanding CSA STAR methodology from self assessment to certification or attestation and continuous monitoring




24.20


Behind the scenes of continuous monitoring - the CSA STAR methodology 




32.00


Summary and conclusions



]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 7: Creating Trust in Cloud]]>
                </itunes:title>
                                    <itunes:episode>7</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Damir Savanović</span></p>
<p><span style="font-weight:400;">Guest title: </span><span style="font-weight:400;">Senior researcher</span></p>
<p><span style="font-weight:400;">Company: Cloud Security Alliance</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">Creating trust is one of the major challenges for cloud providers and consumers, without trust customers will not be able to move workloads into cloud environments, but trust is a very elusive term that is hard to achieve. In  this episode we talk with Damir Savanović from the Cloud Security Alliance on how cloud providers and consumers can use certifications for increasing trust and how is CSA preparing to the new requirements of continuous monitoring that are arriving with the new EU cyber laws.</span></p>
<p><strong>Timing</strong></p>
<table>
<tbody>
<tr>
<td>
<p><span style="font-weight:400;">0:00</span></p>
</td>
<td>
<p><span style="font-weight:400;">Intro and introducing our guest and overview of Damir activities in the area of cloud security</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">5:40</span></p>
</td>
<td>
<p><span style="font-weight:400;">Introducing Cloud Security Alliance activities and major projects (STAR and CCSK)</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">9.17 </span></p>
</td>
<td>
<p><span style="font-weight:400;">The true meaning of trust in cloud computing. Using attestation and certification for establishing trust</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">14:50  </span></p>
</td>
<td>
<p><span style="font-weight:400;">The difference between certification and attestation and the effect of the new EU cybersecurity law on compliance</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">17.50</span></p>
</td>
<td>
<p><span style="font-weight:400;">Understanding CSA STAR methodology from self assessment to certification or attestation and continuous monitoring</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">24.20</span></p>
</td>
<td>
<p><span style="font-weight:400;">Behind the scenes of continuous monitoring - the CSA STAR methodology </span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">32.00</span></p>
</td>
<td>
<p><span style="font-weight:400;">Summary and conclusions</span></p>
</td>
</tr>
</tbody>
</table>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/silver-lining-07.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-7-creating-trust-in-cloud&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-7-creating-trust-in-cloud&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=a3ae171578c8b05c9277f29acc5913366136a99d96538e4c779286e69a2e772b" length="34998433"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Damir Savanović
Guest title: Senior researcher
Company: Cloud Security Alliance
Abstract
Creating trust is one of the major challenges for cloud providers and consumers, without trust customers will not be able to move workloads into cloud environments, but trust is a very elusive term that is hard to achieve. In  this episode we talk with Damir Savanović from the Cloud Security Alliance on how cloud providers and consumers can use certifications for increasing trust and how is CSA preparing to the new requirements of continuous monitoring that are arriving with the new EU cyber laws.
Timing




0:00


Intro and introducing our guest and overview of Damir activities in the area of cloud security




5:40


Introducing Cloud Security Alliance activities and major projects (STAR and CCSK)




9.17 


The true meaning of trust in cloud computing. Using attestation and certification for establishing trust




14:50  


The difference between certification and attestation and the effect of the new EU cybersecurity law on compliance




17.50


Understanding CSA STAR methodology from self assessment to certification or attestation and continuous monitoring




24.20


Behind the scenes of continuous monitoring - the CSA STAR methodology 




32.00


Summary and conclusions



]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/EP-7-PICTURE.jpg"></itunes:image>
                                                                            <itunes:duration>00:36:26</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 6: The Cloud Octagon Model Framework for Cloud Adoption]]>
                </title>
                <pubDate>Mon, 12 Aug 2019 12:25:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-6-the-cloud-octagon-model-framework-for-cloud-adoption</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-6-the-cloud-octagon-model-framework-for-cloud-adoption</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Olaf Streutker</span></p>
<p><span style="font-weight:400;">Guest title: </span><span style="font-weight:400;">CISO Advisor</span></p>
<p><span style="font-weight:400;">Company: ABN Amro</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">The Cloud Octagon Model is a new framework for cloud adoption (mostly SaaS adoption). The model was designed in cooperation between ABN-Amro and the Cloud Security Alliance and assists organizations to identify, represent, and assess risks in the context of their cloud implementation across multiple factors by introducing a logical approach to holistically dealing with security aspects involved in moving to the cloud.</span></p>
<p><span style="font-weight:400;">Link to CSA Cloud Octagon Model:</span></p>
<p><span style="font-weight:400;"><a href="https://cloudsecurityalliance.org/artifacts/cloud-octagon-model/">https://cloudsecurityalliance.org/artifacts/cloud-octagon-model/</a></span></p>
<p> </p>
<p><span style="font-weight:400;">Timing</span></p>
<p><span style="font-weight:400;"> </span></p>
<table>
<tbody>
<tr>
<td>
<p><span style="font-weight:400;">0:00</span></p>
</td>
<td>
<p><span style="font-weight:400;">Intro and introducing the guest and ABN Amro cloud adoption methodology</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">12:10</span></p>
</td>
<td>
<p><span style="font-weight:400;">The evolution of the Cloud Octagon Model and basic concepts</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">11:28 </span></p>
</td>
<td>
<p><span style="font-weight:400;">How ABN-Amro are dealing with IaaS/PaaS vs. SaaS</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">15:30</span></p>
</td>
<td>
<p><span style="font-weight:400;">The different phases of the Cloud Octagon Model: Classification</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">20.30</span></p>
</td>
<td>
<p><span style="font-weight:400;">Core banking applications in the cloud</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">24.20</span></p>
</td>
<td>
<p><span style="font-weight:400;">The different phases of the Cloud Octagon Model</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">31.20</span></p>
</td>
<td>
<p><span style="font-weight:400;">Summary and conclusions</span></p>
</td>
</tr>
</tbody>
</table>
<p> </p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Olaf Streutker
Guest title: CISO Advisor
Company: ABN Amro
Abstract
The Cloud Octagon Model is a new framework for cloud adoption (mostly SaaS adoption). The model was designed in cooperation between ABN-Amro and the Cloud Security Alliance and assists organizations to identify, represent, and assess risks in the context of their cloud implementation across multiple factors by introducing a logical approach to holistically dealing with security aspects involved in moving to the cloud.
Link to CSA Cloud Octagon Model:
https://cloudsecurityalliance.org/artifacts/cloud-octagon-model/
 
Timing
 




0:00


Intro and introducing the guest and ABN Amro cloud adoption methodology




12:10


The evolution of the Cloud Octagon Model and basic concepts




11:28 


How ABN-Amro are dealing with IaaS/PaaS vs. SaaS




15:30


The different phases of the Cloud Octagon Model: Classification




20.30


Core banking applications in the cloud




24.20


The different phases of the Cloud Octagon Model




31.20


Summary and conclusions




 ]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 6: The Cloud Octagon Model Framework for Cloud Adoption]]>
                </itunes:title>
                                    <itunes:episode>6</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Olaf Streutker</span></p>
<p><span style="font-weight:400;">Guest title: </span><span style="font-weight:400;">CISO Advisor</span></p>
<p><span style="font-weight:400;">Company: ABN Amro</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">The Cloud Octagon Model is a new framework for cloud adoption (mostly SaaS adoption). The model was designed in cooperation between ABN-Amro and the Cloud Security Alliance and assists organizations to identify, represent, and assess risks in the context of their cloud implementation across multiple factors by introducing a logical approach to holistically dealing with security aspects involved in moving to the cloud.</span></p>
<p><span style="font-weight:400;">Link to CSA Cloud Octagon Model:</span></p>
<p><span style="font-weight:400;"><a href="https://cloudsecurityalliance.org/artifacts/cloud-octagon-model/">https://cloudsecurityalliance.org/artifacts/cloud-octagon-model/</a></span></p>
<p> </p>
<p><span style="font-weight:400;">Timing</span></p>
<p><span style="font-weight:400;"> </span></p>
<table>
<tbody>
<tr>
<td>
<p><span style="font-weight:400;">0:00</span></p>
</td>
<td>
<p><span style="font-weight:400;">Intro and introducing the guest and ABN Amro cloud adoption methodology</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">12:10</span></p>
</td>
<td>
<p><span style="font-weight:400;">The evolution of the Cloud Octagon Model and basic concepts</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">11:28 </span></p>
</td>
<td>
<p><span style="font-weight:400;">How ABN-Amro are dealing with IaaS/PaaS vs. SaaS</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">15:30</span></p>
</td>
<td>
<p><span style="font-weight:400;">The different phases of the Cloud Octagon Model: Classification</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">20.30</span></p>
</td>
<td>
<p><span style="font-weight:400;">Core banking applications in the cloud</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">24.20</span></p>
</td>
<td>
<p><span style="font-weight:400;">The different phases of the Cloud Octagon Model</span></p>
</td>
</tr>
<tr>
<td>
<p><span style="font-weight:400;">31.20</span></p>
</td>
<td>
<p><span style="font-weight:400;">Summary and conclusions</span></p>
</td>
</tr>
</tbody>
</table>
<p> </p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/silver-lining-06.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-6-the-cloud-octagon-model-framework-for-cloud-adoption&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-6-the-cloud-octagon-model-framework-for-cloud-adoption&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=c2984d43a9d34987b5224768fb3d2468e3d8f3fdf2acd4fcac38637ac93f6c82" length="32431740"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Olaf Streutker
Guest title: CISO Advisor
Company: ABN Amro
Abstract
The Cloud Octagon Model is a new framework for cloud adoption (mostly SaaS adoption). The model was designed in cooperation between ABN-Amro and the Cloud Security Alliance and assists organizations to identify, represent, and assess risks in the context of their cloud implementation across multiple factors by introducing a logical approach to holistically dealing with security aspects involved in moving to the cloud.
Link to CSA Cloud Octagon Model:
https://cloudsecurityalliance.org/artifacts/cloud-octagon-model/
 
Timing
 




0:00


Intro and introducing the guest and ABN Amro cloud adoption methodology




12:10


The evolution of the Cloud Octagon Model and basic concepts




11:28 


How ABN-Amro are dealing with IaaS/PaaS vs. SaaS




15:30


The different phases of the Cloud Octagon Model: Classification




20.30


Core banking applications in the cloud




24.20


The different phases of the Cloud Octagon Model




31.20


Summary and conclusions




 ]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/EP-6-PIC.jpg"></itunes:image>
                                                                            <itunes:duration>00:33:45</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 5: Guard Rails And Not Gates – How R&D And Security Should Co-Exist Audio Player]]>
                </title>
                <pubDate>Thu, 25 Jul 2019 13:08:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-5-guard-rails-and-not-gates-how-rd-and-security-should-co-exist-audio-player-1</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-5-guard-rails-and-not-gates-how-rd-and-security-should-co-exist-audio-player-1</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Guy Flechter</span></p>
<p><span style="font-weight:400;">Guest title: </span><span style="font-weight:400;">CISO</span></p>
<p><span style="font-weight:400;">Company: AppFlayer</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">One of the biggest challenges facing software companies is how to make sure security policies are enforced across the development cycle without holding R&amp;D ability to innovate. In this episode, Guy Flechter, CISO for Appsflyer, will elaborate on the way he  is providing R&amp;D guidelines and support while keeping them motivated and committed to security.</span></p>
<p><span style="font-weight:400;"> </span></p>
<p><strong>Timing</strong></p>
<table style="color:#626262;">
<tbody>
<tr>
<td>
<p>0:00</p>
</td>
<td>
<p>Intro and introducing Appsflyer and its digital business</p>
</td>
</tr>
<tr>
<td>
<p>10:29</p>
</td>
<td>
<p>Understanding Appsflyer underlying technology and security challenges</p>
</td>
</tr>
<tr>
<td>
<p>14:20 </p>
</td>
<td>
<p>“We came in peace” Building security foundation at Appsflyer - understanding Guy’s methodology</p>
</td>
</tr>
<tr>
<td>
<p>19:55  </p>
</td>
<td>
<p>the people angle: Building the right team and how to work efficiently with R&amp;D team. </p>
</td>
</tr>
<tr>
<td>
<p>27.40</p>
</td>
<td>
<p>The technology angel:  How to make sure developers don’t need security in everyday life, but they are still on the right tracks</p>
</td>
</tr>
<tr>
<td>
<p>37.10</p>
</td>
<td>
<p>The process angel: building developers autonomy</p>
</td>
</tr>
<tr>
<td>
<p>40.25</p>
</td>
<td>
<p>Summary and conclusion</p>
</td>
</tr>
</tbody>
</table>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Guy Flechter
Guest title: CISO
Company: AppFlayer
Abstract
One of the biggest challenges facing software companies is how to make sure security policies are enforced across the development cycle without holding R&D ability to innovate. In this episode, Guy Flechter, CISO for Appsflyer, will elaborate on the way he  is providing R&D guidelines and support while keeping them motivated and committed to security.
 
Timing




0:00


Intro and introducing Appsflyer and its digital business




10:29


Understanding Appsflyer underlying technology and security challenges




14:20 


“We came in peace” Building security foundation at Appsflyer - understanding Guy’s methodology




19:55  


the people angle: Building the right team and how to work efficiently with R&D team. 




27.40


The technology angel:  How to make sure developers don’t need security in everyday life, but they are still on the right tracks




37.10


The process angel: building developers autonomy




40.25


Summary and conclusion



]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 5: Guard Rails And Not Gates – How R&D And Security Should Co-Exist Audio Player]]>
                </itunes:title>
                                    <itunes:episode>5</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Guy Flechter</span></p>
<p><span style="font-weight:400;">Guest title: </span><span style="font-weight:400;">CISO</span></p>
<p><span style="font-weight:400;">Company: AppFlayer</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">One of the biggest challenges facing software companies is how to make sure security policies are enforced across the development cycle without holding R&amp;D ability to innovate. In this episode, Guy Flechter, CISO for Appsflyer, will elaborate on the way he  is providing R&amp;D guidelines and support while keeping them motivated and committed to security.</span></p>
<p><span style="font-weight:400;"> </span></p>
<p><strong>Timing</strong></p>
<table style="color:#626262;">
<tbody>
<tr>
<td>
<p>0:00</p>
</td>
<td>
<p>Intro and introducing Appsflyer and its digital business</p>
</td>
</tr>
<tr>
<td>
<p>10:29</p>
</td>
<td>
<p>Understanding Appsflyer underlying technology and security challenges</p>
</td>
</tr>
<tr>
<td>
<p>14:20 </p>
</td>
<td>
<p>“We came in peace” Building security foundation at Appsflyer - understanding Guy’s methodology</p>
</td>
</tr>
<tr>
<td>
<p>19:55  </p>
</td>
<td>
<p>the people angle: Building the right team and how to work efficiently with R&amp;D team. </p>
</td>
</tr>
<tr>
<td>
<p>27.40</p>
</td>
<td>
<p>The technology angel:  How to make sure developers don’t need security in everyday life, but they are still on the right tracks</p>
</td>
</tr>
<tr>
<td>
<p>37.10</p>
</td>
<td>
<p>The process angel: building developers autonomy</p>
</td>
</tr>
<tr>
<td>
<p>40.25</p>
</td>
<td>
<p>Summary and conclusion</p>
</td>
</tr>
</tbody>
</table>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/EPISODE-5.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-5-guard-rails-and-not-gates-how-rd-and-security-should-co-exist-audio-player-1&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-5-guard-rails-and-not-gates-how-rd-and-security-should-co-exist-audio-player-1&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=ba3819b1c05f15b94dccb3394311294a97b06aba31aebe170ee6ed1860795aab" length="51024986"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Guy Flechter
Guest title: CISO
Company: AppFlayer
Abstract
One of the biggest challenges facing software companies is how to make sure security policies are enforced across the development cycle without holding R&D ability to innovate. In this episode, Guy Flechter, CISO for Appsflyer, will elaborate on the way he  is providing R&D guidelines and support while keeping them motivated and committed to security.
 
Timing




0:00


Intro and introducing Appsflyer and its digital business




10:29


Understanding Appsflyer underlying technology and security challenges




14:20 


“We came in peace” Building security foundation at Appsflyer - understanding Guy’s methodology




19:55  


the people angle: Building the right team and how to work efficiently with R&D team. 




27.40


The technology angel:  How to make sure developers don’t need security in everyday life, but they are still on the right tracks




37.10


The process angel: building developers autonomy




40.25


Summary and conclusion



]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/EPISODE-5-PICTURE.jpg"></itunes:image>
                                                                            <itunes:duration>00:53:07</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 4: Kubernetes On Steroids]]>
                </title>
                <pubDate>Tue, 09 Jul 2019 08:08:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-4-kubernetes-on-steroids-1</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-4-kubernetes-on-steroids-1</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Demi Ben Ari</span></p>
<p><span style="font-weight:400;">Guest title: </span><span style="font-weight:400;">CTO</span></p>
<p><span style="font-weight:400;">Company: Panorays</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">K8 is rapidly becoming the leading orchestration tool and infrastructure for many companies applications. K8 bring tremendous advantages, provide operations with flexibility and enabling multi cloud deployments. But with all that good there are also challenges. In this podcast we talk with Demi Ben Ari, Founder and R&amp;D at Panorays, A saas company that deployed K8 as infrastructure for fleet of scanners and crawlers. Demi will share his experience with the platform and steps he took in order to utilize most benefits from K8.</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Demi Ben Ari
Guest title: CTO
Company: Panorays
Abstract
K8 is rapidly becoming the leading orchestration tool and infrastructure for many companies applications. K8 bring tremendous advantages, provide operations with flexibility and enabling multi cloud deployments. But with all that good there are also challenges. In this podcast we talk with Demi Ben Ari, Founder and R&D at Panorays, A saas company that deployed K8 as infrastructure for fleet of scanners and crawlers. Demi will share his experience with the platform and steps he took in order to utilize most benefits from K8.]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 4: Kubernetes On Steroids]]>
                </itunes:title>
                                    <itunes:episode>4</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Demi Ben Ari</span></p>
<p><span style="font-weight:400;">Guest title: </span><span style="font-weight:400;">CTO</span></p>
<p><span style="font-weight:400;">Company: Panorays</span></p>
<p><strong>Abstract</strong></p>
<p><span style="font-weight:400;">K8 is rapidly becoming the leading orchestration tool and infrastructure for many companies applications. K8 bring tremendous advantages, provide operations with flexibility and enabling multi cloud deployments. But with all that good there are also challenges. In this podcast we talk with Demi Ben Ari, Founder and R&amp;D at Panorays, A saas company that deployed K8 as infrastructure for fleet of scanners and crawlers. Demi will share his experience with the platform and steps he took in order to utilize most benefits from K8.</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/EPISODE-4.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-4-kubernetes-on-steroids-1&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-4-kubernetes-on-steroids-1&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=94e6738af8d077c6c6bbcf9f6b39a89bbffc0b6d5561dc7564047937ef070bb3" length="37905319"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Demi Ben Ari
Guest title: CTO
Company: Panorays
Abstract
K8 is rapidly becoming the leading orchestration tool and infrastructure for many companies applications. K8 bring tremendous advantages, provide operations with flexibility and enabling multi cloud deployments. But with all that good there are also challenges. In this podcast we talk with Demi Ben Ari, Founder and R&D at Panorays, A saas company that deployed K8 as infrastructure for fleet of scanners and crawlers. Demi will share his experience with the platform and steps he took in order to utilize most benefits from K8.]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/EPISODE-4-PICTURE.jpeg"></itunes:image>
                                                                            <itunes:duration>00:39:27</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 3: Cloud Configuration Pitfalls]]>
                </title>
                <pubDate>Mon, 24 Jun 2019 07:22:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-3-cloud-configuration-pitfalls</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-3-cloud-configuration-pitfalls</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Evgeny Zislis</span></p>
<p><span style="font-weight:400;">Guest title: </span><span style="font-weight:400;"> CTO</span></p>
<p><span style="font-weight:400;">Company:  ProdOPS</span></p>
<h1><strong>Abstract</strong></h1>
<p><span style="font-weight:400;">Over 90% of IaaS/PaaS security incidents happens on consumer fault. Cloud platforms are complicated, with steep learning curve and it is easy to make mistakes. </span><span style="font-weight:400;">In this podcast, we talk with Evgeny Zislis, CTO for ProdOPS about the common IaaS/PaaS security mistakes and misconfigurations, categorize them and talk about measures to reduce those mistakes and identify them on time. </span></p>
<p><strong>Timing:</strong></p>
<p><span style="font-weight:400;">0:00 – 2:10 - intro and introducing our guest</span></p>
<p><span style="font-weight:400;">2:10 -   31:05 - What are the common cloud misconfiguration and mistakes </span></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Improper security group configuration</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Object storage negligence - open buckets on s3</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Insecure storing of API/Access Keys - config file in open Github repo is not the best place to store access keys</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Vulnerable servers exposed (exposing your 5 years old, not updated linux server is not recommended)</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Fail to segregate different services into different accounts / vpc / subnets</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Everyday use of root account and relying on one account only</span></li>
</ul>
<p><span style="font-weight:400;">31:05 -  34:20  Avoiding cloud misconfigurations:  the process angle</span></p>
<p><span style="font-weight:400;">34:20 -  38:33 Avoiding cloud misconfigurations:  the people angle</span></p>
<p><span style="font-weight:400;">38:33 -  49:00 Avoiding cloud misconfigurations:  the technology angle    </span></p>
<p><span style="font-weight:400;">49.00 – 52:00 Summary and conclusions</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Evgeny Zislis
Guest title:  CTO
Company:  ProdOPS
Abstract
Over 90% of IaaS/PaaS security incidents happens on consumer fault. Cloud platforms are complicated, with steep learning curve and it is easy to make mistakes. In this podcast, we talk with Evgeny Zislis, CTO for ProdOPS about the common IaaS/PaaS security mistakes and misconfigurations, categorize them and talk about measures to reduce those mistakes and identify them on time. 
Timing:
0:00 – 2:10 - intro and introducing our guest
2:10 -   31:05 - What are the common cloud misconfiguration and mistakes 

Improper security group configuration
Object storage negligence - open buckets on s3
Insecure storing of API/Access Keys - config file in open Github repo is not the best place to store access keys
Vulnerable servers exposed (exposing your 5 years old, not updated linux server is not recommended)
Fail to segregate different services into different accounts / vpc / subnets
Everyday use of root account and relying on one account only

31:05 -  34:20  Avoiding cloud misconfigurations:  the process angle
34:20 -  38:33 Avoiding cloud misconfigurations:  the people angle
38:33 -  49:00 Avoiding cloud misconfigurations:  the technology angle    
49.00 – 52:00 Summary and conclusions]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 3: Cloud Configuration Pitfalls]]>
                </itunes:title>
                                    <itunes:episode>3</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Evgeny Zislis</span></p>
<p><span style="font-weight:400;">Guest title: </span><span style="font-weight:400;"> CTO</span></p>
<p><span style="font-weight:400;">Company:  ProdOPS</span></p>
<h1><strong>Abstract</strong></h1>
<p><span style="font-weight:400;">Over 90% of IaaS/PaaS security incidents happens on consumer fault. Cloud platforms are complicated, with steep learning curve and it is easy to make mistakes. </span><span style="font-weight:400;">In this podcast, we talk with Evgeny Zislis, CTO for ProdOPS about the common IaaS/PaaS security mistakes and misconfigurations, categorize them and talk about measures to reduce those mistakes and identify them on time. </span></p>
<p><strong>Timing:</strong></p>
<p><span style="font-weight:400;">0:00 – 2:10 - intro and introducing our guest</span></p>
<p><span style="font-weight:400;">2:10 -   31:05 - What are the common cloud misconfiguration and mistakes </span></p>
<ul>
<li style="font-weight:400;"><span style="font-weight:400;">Improper security group configuration</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Object storage negligence - open buckets on s3</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Insecure storing of API/Access Keys - config file in open Github repo is not the best place to store access keys</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Vulnerable servers exposed (exposing your 5 years old, not updated linux server is not recommended)</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Fail to segregate different services into different accounts / vpc / subnets</span></li>
<li style="font-weight:400;"><span style="font-weight:400;">Everyday use of root account and relying on one account only</span></li>
</ul>
<p><span style="font-weight:400;">31:05 -  34:20  Avoiding cloud misconfigurations:  the process angle</span></p>
<p><span style="font-weight:400;">34:20 -  38:33 Avoiding cloud misconfigurations:  the people angle</span></p>
<p><span style="font-weight:400;">38:33 -  49:00 Avoiding cloud misconfigurations:  the technology angle    </span></p>
<p><span style="font-weight:400;">49.00 – 52:00 Summary and conclusions</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/Copy-of-ep-3-final.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-3-cloud-configuration-pitfalls&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-3-cloud-configuration-pitfalls&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=e0f4955a483111603cbf9dc5edd227a302ad32e4a9cd72376b861bacacf5352a" length="49296523"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Evgeny Zislis
Guest title:  CTO
Company:  ProdOPS
Abstract
Over 90% of IaaS/PaaS security incidents happens on consumer fault. Cloud platforms are complicated, with steep learning curve and it is easy to make mistakes. In this podcast, we talk with Evgeny Zislis, CTO for ProdOPS about the common IaaS/PaaS security mistakes and misconfigurations, categorize them and talk about measures to reduce those mistakes and identify them on time. 
Timing:
0:00 – 2:10 - intro and introducing our guest
2:10 -   31:05 - What are the common cloud misconfiguration and mistakes 

Improper security group configuration
Object storage negligence - open buckets on s3
Insecure storing of API/Access Keys - config file in open Github repo is not the best place to store access keys
Vulnerable servers exposed (exposing your 5 years old, not updated linux server is not recommended)
Fail to segregate different services into different accounts / vpc / subnets
Everyday use of root account and relying on one account only

31:05 -  34:20  Avoiding cloud misconfigurations:  the process angle
34:20 -  38:33 Avoiding cloud misconfigurations:  the people angle
38:33 -  49:00 Avoiding cloud misconfigurations:  the technology angle    
49.00 – 52:00 Summary and conclusions]]>
                </itunes:summary>
                                                                            <itunes:duration>00:51:19</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 2: Security Challenges Of Moving From Monolith To Micro-Services]]>
                </title>
                <pubDate>Mon, 22 Apr 2019 18:01:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-2-security-challenges-of-moving-from-monolith-to-micro-services-1</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-2-security-challenges-of-moving-from-monolith-to-micro-services-1</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Yuval Reut, </span></p>
<p><span style="font-weight:400;">Guest title:  </span><span style="font-weight:400;">CIO &amp; CISO </span></p>
<p><span style="font-weight:400;">Company: </span><span style="font-weight:400;"> Riskified </span></p>
<p>Micro-services can bring enormous benefits into the organizations – giving flexibility and driving innovation. But Micro-services are also challenging from a security point of view. In this podcast, Yuval Reut, CIO &amp; CISO for Riskified, will share his experience of moving an entire monolith application to a group of integrated micro services.</p>
<p><strong>Timing:</strong></p>
<p><span style="font-weight:400;">0:00 – 3:39 - intro and learning about Riskified</span></p>
<p><span style="font-weight:400;">3:39 - 9:55 </span><span style="font-weight:400;">- CISO &amp; CIO positions at SaaS startups</span></p>
<p><span style="font-weight:400;">9:55 - 12:20 </span><span style="font-weight:400;">- moving from Monolith to Microservices – reasons for the move.</span></p>
<p><span style="font-weight:400;">12:20 - 19:30 - technology challenges when moving to Micro services</span></p>
<p><span style="font-weight:400;">19:30 - 25:00 - </span><span style="font-weight:400;">People challenges when moving to Micro services</span></p>
<p><span style="font-weight:400;">25:00 – 29:35 - Process challenges when moving to Micro services        </span></p>
<p><span style="font-weight:400;">29.40 – 33:00 - Summary and conclusions</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Yuval Reut, 
Guest title:  CIO & CISO 
Company:  Riskified 
Micro-services can bring enormous benefits into the organizations – giving flexibility and driving innovation. But Micro-services are also challenging from a security point of view. In this podcast, Yuval Reut, CIO & CISO for Riskified, will share his experience of moving an entire monolith application to a group of integrated micro services.
Timing:
0:00 – 3:39 - intro and learning about Riskified
3:39 - 9:55 - CISO & CIO positions at SaaS startups
9:55 - 12:20 - moving from Monolith to Microservices – reasons for the move.
12:20 - 19:30 - technology challenges when moving to Micro services
19:30 - 25:00 - People challenges when moving to Micro services
25:00 – 29:35 - Process challenges when moving to Micro services        
29.40 – 33:00 - Summary and conclusions]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 2: Security Challenges Of Moving From Monolith To Micro-Services]]>
                </itunes:title>
                                    <itunes:episode>2</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Yuval Reut, </span></p>
<p><span style="font-weight:400;">Guest title:  </span><span style="font-weight:400;">CIO &amp; CISO </span></p>
<p><span style="font-weight:400;">Company: </span><span style="font-weight:400;"> Riskified </span></p>
<p>Micro-services can bring enormous benefits into the organizations – giving flexibility and driving innovation. But Micro-services are also challenging from a security point of view. In this podcast, Yuval Reut, CIO &amp; CISO for Riskified, will share his experience of moving an entire monolith application to a group of integrated micro services.</p>
<p><strong>Timing:</strong></p>
<p><span style="font-weight:400;">0:00 – 3:39 - intro and learning about Riskified</span></p>
<p><span style="font-weight:400;">3:39 - 9:55 </span><span style="font-weight:400;">- CISO &amp; CIO positions at SaaS startups</span></p>
<p><span style="font-weight:400;">9:55 - 12:20 </span><span style="font-weight:400;">- moving from Monolith to Microservices – reasons for the move.</span></p>
<p><span style="font-weight:400;">12:20 - 19:30 - technology challenges when moving to Micro services</span></p>
<p><span style="font-weight:400;">19:30 - 25:00 - </span><span style="font-weight:400;">People challenges when moving to Micro services</span></p>
<p><span style="font-weight:400;">25:00 – 29:35 - Process challenges when moving to Micro services        </span></p>
<p><span style="font-weight:400;">29.40 – 33:00 - Summary and conclusions</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/EPISODE-2.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-2-security-challenges-of-moving-from-monolith-to-micro-services-1&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-2-security-challenges-of-moving-from-monolith-to-micro-services-1&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=847eec72a378359b476986382a09687d83db2c87f8e7795dd3080f9cdbf20eac" length="32133763"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Yuval Reut, 
Guest title:  CIO & CISO 
Company:  Riskified 
Micro-services can bring enormous benefits into the organizations – giving flexibility and driving innovation. But Micro-services are also challenging from a security point of view. In this podcast, Yuval Reut, CIO & CISO for Riskified, will share his experience of moving an entire monolith application to a group of integrated micro services.
Timing:
0:00 – 3:39 - intro and learning about Riskified
3:39 - 9:55 - CISO & CIO positions at SaaS startups
9:55 - 12:20 - moving from Monolith to Microservices – reasons for the move.
12:20 - 19:30 - technology challenges when moving to Micro services
19:30 - 25:00 - People challenges when moving to Micro services
25:00 – 29:35 - Process challenges when moving to Micro services        
29.40 – 33:00 - Summary and conclusions]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/EPISODE-2-PICTURE.jpg"></itunes:image>
                                                                            <itunes:duration>00:33:27</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
                    <item>
                <title>
                    <![CDATA[Episode 1: Security Challenges With The Growing World Of Serverless Functions]]>
                </title>
                <pubDate>Sun, 04 Nov 2018 10:47:00 +0000</pubDate>
                <dc:creator>MarkeTech Group</dc:creator>
                <guid isPermaLink="true">
                    https://silverlining-il.castos.com/podcasts/5725/episodes/episode-1-security-challenges-with-the-growing-world-of-serverless-functions-1</guid>
                                    <link>https://silverlining-il.castos.com/episodes/episode-1-security-challenges-with-the-growing-world-of-serverless-functions-1</link>
                                <description>
                                            <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Ory Segal, Puresec</span></p>
<p><span style="font-weight:400;">Guest title:  </span><span style="font-weight:400;">CTO &amp; Co-Founder at PureSec</span></p>
<p><span style="font-weight:400;">Company: </span><span style="font-weight:400;"> Puresec is the global leader in serverless architectures security. </span></p>
<p> </p>
<p>Serverless functions are one the most interesting things that is happening in architecture of application development. With Serverless, application developers can stop worry about the underlying infrastructure and scalability of the application, but they must address other risks at application level. In this podcast we are interviewing Puresec CTO, Ory Segal , co-author of the top 12 risks to serverless applications</p>
<p> </p>
<p><strong>Timing</strong></p>
<p><span style="font-weight:400;">0:00 – 2:35 – intro</span></p>
<p><span style="font-weight:400;">2:35 – 8:05 - what are Serverless functions</span></p>
<p><span style="font-weight:400;">8:05- 12:20 - how Serverless is different (security wise)</span></p>
<p><span style="font-weight:400;">12:20 -  19:40 - Serverless risks &amp; threats</span></p>
<p><span style="font-weight:400;">19:40 -  24:00 - common mistakes and misconfiguration with Serverless</span></p>
<p><span style="font-weight:400;">24:00 – 29:30</span> <span style="font-weight:400;">- Serverless effect on people, process and technology</span></p>
<p><span style="font-weight:400;">29:30 – 37:00 – Summary and conclusions</span></p>]]>
                                    </description>
                <itunes:subtitle>
                    <![CDATA[Attendees
Guest: Ory Segal, Puresec
Guest title:  CTO & Co-Founder at PureSec
Company:  Puresec is the global leader in serverless architectures security. 
 
Serverless functions are one the most interesting things that is happening in architecture of application development. With Serverless, application developers can stop worry about the underlying infrastructure and scalability of the application, but they must address other risks at application level. In this podcast we are interviewing Puresec CTO, Ory Segal , co-author of the top 12 risks to serverless applications
 
Timing
0:00 – 2:35 – intro
2:35 – 8:05 - what are Serverless functions
8:05- 12:20 - how Serverless is different (security wise)
12:20 -  19:40 - Serverless risks & threats
19:40 -  24:00 - common mistakes and misconfiguration with Serverless
24:00 – 29:30 - Serverless effect on people, process and technology
29:30 – 37:00 – Summary and conclusions]]>
                </itunes:subtitle>
                                    <itunes:episodeType>full</itunes:episodeType>
                                <itunes:title>
                    <![CDATA[Episode 1: Security Challenges With The Growing World Of Serverless Functions]]>
                </itunes:title>
                                    <itunes:episode>1</itunes:episode>
                                                <itunes:explicit>false</itunes:explicit>
                <content:encoded>
                    <![CDATA[<p><strong>Attendees</strong></p>
<p><span style="font-weight:400;">Guest: Ory Segal, Puresec</span></p>
<p><span style="font-weight:400;">Guest title:  </span><span style="font-weight:400;">CTO &amp; Co-Founder at PureSec</span></p>
<p><span style="font-weight:400;">Company: </span><span style="font-weight:400;"> Puresec is the global leader in serverless architectures security. </span></p>
<p> </p>
<p>Serverless functions are one the most interesting things that is happening in architecture of application development. With Serverless, application developers can stop worry about the underlying infrastructure and scalability of the application, but they must address other risks at application level. In this podcast we are interviewing Puresec CTO, Ory Segal , co-author of the top 12 risks to serverless applications</p>
<p> </p>
<p><strong>Timing</strong></p>
<p><span style="font-weight:400;">0:00 – 2:35 – intro</span></p>
<p><span style="font-weight:400;">2:35 – 8:05 - what are Serverless functions</span></p>
<p><span style="font-weight:400;">8:05- 12:20 - how Serverless is different (security wise)</span></p>
<p><span style="font-weight:400;">12:20 -  19:40 - Serverless risks &amp; threats</span></p>
<p><span style="font-weight:400;">19:40 -  24:00 - common mistakes and misconfiguration with Serverless</span></p>
<p><span style="font-weight:400;">24:00 – 29:30</span> <span style="font-weight:400;">- Serverless effect on people, process and technology</span></p>
<p><span style="font-weight:400;">29:30 – 37:00 – Summary and conclusions</span></p>]]>
                </content:encoded>
                                    <enclosure url="https://episodes.castos.com/5e4aaf232467c1-76191533/EPISODE-1.mp3?awCollectionId=5725&amp;awEpisodeId=https%3A%2F%2Fsilverlining-il.castos.com%2Fpodcasts%2F5725%2Fepisodes%2Fepisode-1-security-challenges-with-the-growing-world-of-serverless-functions-1&amp;aw_0_1st.ri=castos&amp;aw_0_cnt.rss=https%3A%2F%2Ffeeds.castos.com%2Fokr2&amp;aw_0_azn.pgenre=%5BTechnology%2CNews%3A+Tech+News%2CEducation%5D&amp;aw_0_cnt.url=https%3A%2F%2Fsilverlining-il.castos.com%2Fepisodes%2Fepisode-1-security-challenges-with-the-growing-world-of-serverless-functions-1&amp;aw_0_azn.planguage=en&amp;aw_0_azn.pcountry=IL&amp;q_co=da904250e00a3137f86b1aadb661b9c9e388dbeaed01ce400d766aa86abac49f" length="36208405"
                        type="audio/mpeg">
                    </enclosure>
                                <itunes:summary>
                    <![CDATA[Attendees
Guest: Ory Segal, Puresec
Guest title:  CTO & Co-Founder at PureSec
Company:  Puresec is the global leader in serverless architectures security. 
 
Serverless functions are one the most interesting things that is happening in architecture of application development. With Serverless, application developers can stop worry about the underlying infrastructure and scalability of the application, but they must address other risks at application level. In this podcast we are interviewing Puresec CTO, Ory Segal , co-author of the top 12 risks to serverless applications
 
Timing
0:00 – 2:35 – intro
2:35 – 8:05 - what are Serverless functions
8:05- 12:20 - how Serverless is different (security wise)
12:20 -  19:40 - Serverless risks & threats
19:40 -  24:00 - common mistakes and misconfiguration with Serverless
24:00 – 29:30 - Serverless effect on people, process and technology
29:30 – 37:00 – Summary and conclusions]]>
                </itunes:summary>
                                    <itunes:image href="https://episodes.castos.com/5e4aaf232467c1-76191533/images/EPISODE-1-PICTURE.jpg"></itunes:image>
                                                                            <itunes:duration>00:37:41</itunes:duration>
                                                    <itunes:author>
                    <![CDATA[MarkeTech Group]]>
                </itunes:author>
                            </item>
            </channel>
</rss>
