Cloud cybersecurity: Vulnerabilities, frauds and limitations | Mateusz Chrobok | The Dev is in the Details #5
Manage episode 410489394 series 3516159
► Is cloud security an illusion?
Join us in this eye-opening episode as cybersecurity expert Mateusz Chrobok reveals the vulnerabilities and limitations lurking within cloud services. From analyzing real-life examples to dissecting the fraudulent tactics used by cybercriminals, this discussion will shed light on the harsh realities of cloud security.
► Our guest 🌟
Mateusz Chrobok 👉 https://www.linkedin.com/in/mateuszchrobok/
Cybersecurity, AI and Startup consultant.
► In today’s episode:
- Proactive measures undertaken by cloud service providers to safeguard the integrity of the cloud and the tangible outcomes of their efforts.
- Sophisticated tactics employed by cybercriminals in exploiting vulnerabilities within cloud services.
- Nuanced methodologies to infiltrate cloud systems and jeopardize sensitive data.
- In-depth analysis and real-world case studies illustrating how vulnerabilities in cloud environments can lead to security breaches and data compromises.
- Realms of malvertising, fraudulent activities, and the clandestine operations of the darknet.
- Navigating the delicate balance between individual freedoms and the imperative of security.
► Decoding the timeline:
00:00 – Cloud service providers' responsibilities and vulnerabilities
06:18 – Limitations of the cloud
09:35 – Opens source vs closed source safety considerations
12:37 – Poisoned language models
16:03 – Malvertising
20:45 – Darknet operations
23:23 - Freedom vs security on the Internet
36:49 - Cryptography, AI, and cybersecurity
52:11 - Battling misinformation in the digital age
#AI #cybersecurity #cloud
► Materials and information mentioned in the episode:
***
The Dev is in the Details is a podcast where we talk about technology, business and their impacts on the world around us.
Łukasz Łażewski 👉 https://www.linkedin.com/in/lukasz-lazewski/
Write to us 👉 podcast@llinformatics.com
章
1. Cloud service providers' responsibilities and vulnerabilities (00:00:00)
2. Limitations of the cloud (00:06:18)
3. Opens source vs closed source safety considerations (00:09:35)
4. Poisoned language models (00:12:37)
5. Malvertising (00:16:03)
6. Darknet operations (00:20:45)
7. Freedom vs security on the Internet (00:23:23)
8. Cryptography, AI, and Cybersecurity Trends (00:36:49)
9. Battling Misinformation in the Digital Age (00:52:11)
10 つのエピソード