Artwork

コンテンツは Lukasz Lazewski によって提供されます。エピソード、グラフィック、ポッドキャストの説明を含むすべてのポッドキャスト コンテンツは、Lukasz Lazewski またはそのポッドキャスト プラットフォーム パートナーによって直接アップロードされ、提供されます。誰かがあなたの著作物をあなたの許可なく使用していると思われる場合は、ここで概説されているプロセスに従うことができますhttps://ja.player.fm/legal
Player FM -ポッドキャストアプリ
Player FMアプリでオフラインにしPlayer FMう!

Cloud cybersecurity: Vulnerabilities, frauds and limitations | Mateusz Chrobok | The Dev is in the Details #5

1:00:16
 
シェア
 

Manage episode 410489394 series 3516159
コンテンツは Lukasz Lazewski によって提供されます。エピソード、グラフィック、ポッドキャストの説明を含むすべてのポッドキャスト コンテンツは、Lukasz Lazewski またはそのポッドキャスト プラットフォーム パートナーによって直接アップロードされ、提供されます。誰かがあなたの著作物をあなたの許可なく使用していると思われる場合は、ここで概説されているプロセスに従うことができますhttps://ja.player.fm/legal

► Is cloud security an illusion?

Join us in this eye-opening episode as cybersecurity expert Mateusz Chrobok reveals the vulnerabilities and limitations lurking within cloud services. From analyzing real-life examples to dissecting the fraudulent tactics used by cybercriminals, this discussion will shed light on the harsh realities of cloud security.

► Our guest 🌟

Mateusz Chrobok 👉 https://www.linkedin.com/in/mateuszchrobok/
Cybersecurity, AI and Startup consultant.

► In today’s episode:

  • Proactive measures undertaken by cloud service providers to safeguard the integrity of the cloud and the tangible outcomes of their efforts.
  • Sophisticated tactics employed by cybercriminals in exploiting vulnerabilities within cloud services.
  • Nuanced methodologies to infiltrate cloud systems and jeopardize sensitive data.
  • In-depth analysis and real-world case studies illustrating how vulnerabilities in cloud environments can lead to security breaches and data compromises.
  • Realms of malvertising, fraudulent activities, and the clandestine operations of the darknet.
  • Navigating the delicate balance between individual freedoms and the imperative of security.

► Decoding the timeline:

00:00 – Cloud service providers' responsibilities and vulnerabilities
06:18 – Limitations of the cloud
09:35 – Opens source vs closed source safety considerations
12:37 – Poisoned language models
16:03 – Malvertising
20:45 – Darknet operations
23:23 - Freedom vs security on the Internet
36:49 - Cryptography, AI, and cybersecurity
52:11 - Battling misinformation in the digital age

#AI #cybersecurity #cloud

► Materials and information mentioned in the episode:

***
The Dev is in the Details is a podcast where we talk about technology, business and their impacts on the world around us.

Łukasz Łażewski 👉 https://www.linkedin.com/in/lukasz-lazewski-40562718/
Pedro Paranhos 👉 https://www.linkedin.com/in/pedroparanhos/
Write to us 👉 podcast@llinformatics.com

  continue reading

1. Cloud service providers' responsibilities and vulnerabilities (00:00:00)

2. Limitations of the cloud (00:06:18)

3. Opens source vs closed source safety considerations (00:09:35)

4. Poisoned language models (00:12:37)

5. Malvertising (00:16:03)

6. Darknet operations (00:20:45)

7. Freedom vs security on the Internet (00:23:23)

8. Cryptography, AI, and Cybersecurity Trends (00:36:49)

9. Battling Misinformation in the Digital Age (00:52:11)

9 つのエピソード

Artwork
iconシェア
 
Manage episode 410489394 series 3516159
コンテンツは Lukasz Lazewski によって提供されます。エピソード、グラフィック、ポッドキャストの説明を含むすべてのポッドキャスト コンテンツは、Lukasz Lazewski またはそのポッドキャスト プラットフォーム パートナーによって直接アップロードされ、提供されます。誰かがあなたの著作物をあなたの許可なく使用していると思われる場合は、ここで概説されているプロセスに従うことができますhttps://ja.player.fm/legal

► Is cloud security an illusion?

Join us in this eye-opening episode as cybersecurity expert Mateusz Chrobok reveals the vulnerabilities and limitations lurking within cloud services. From analyzing real-life examples to dissecting the fraudulent tactics used by cybercriminals, this discussion will shed light on the harsh realities of cloud security.

► Our guest 🌟

Mateusz Chrobok 👉 https://www.linkedin.com/in/mateuszchrobok/
Cybersecurity, AI and Startup consultant.

► In today’s episode:

  • Proactive measures undertaken by cloud service providers to safeguard the integrity of the cloud and the tangible outcomes of their efforts.
  • Sophisticated tactics employed by cybercriminals in exploiting vulnerabilities within cloud services.
  • Nuanced methodologies to infiltrate cloud systems and jeopardize sensitive data.
  • In-depth analysis and real-world case studies illustrating how vulnerabilities in cloud environments can lead to security breaches and data compromises.
  • Realms of malvertising, fraudulent activities, and the clandestine operations of the darknet.
  • Navigating the delicate balance between individual freedoms and the imperative of security.

► Decoding the timeline:

00:00 – Cloud service providers' responsibilities and vulnerabilities
06:18 – Limitations of the cloud
09:35 – Opens source vs closed source safety considerations
12:37 – Poisoned language models
16:03 – Malvertising
20:45 – Darknet operations
23:23 - Freedom vs security on the Internet
36:49 - Cryptography, AI, and cybersecurity
52:11 - Battling misinformation in the digital age

#AI #cybersecurity #cloud

► Materials and information mentioned in the episode:

***
The Dev is in the Details is a podcast where we talk about technology, business and their impacts on the world around us.

Łukasz Łażewski 👉 https://www.linkedin.com/in/lukasz-lazewski-40562718/
Pedro Paranhos 👉 https://www.linkedin.com/in/pedroparanhos/
Write to us 👉 podcast@llinformatics.com

  continue reading

1. Cloud service providers' responsibilities and vulnerabilities (00:00:00)

2. Limitations of the cloud (00:06:18)

3. Opens source vs closed source safety considerations (00:09:35)

4. Poisoned language models (00:12:37)

5. Malvertising (00:16:03)

6. Darknet operations (00:20:45)

7. Freedom vs security on the Internet (00:23:23)

8. Cryptography, AI, and Cybersecurity Trends (00:36:49)

9. Battling Misinformation in the Digital Age (00:52:11)

9 つのエピソード

All episodes

×
 
Loading …

プレーヤーFMへようこそ!

Player FMは今からすぐに楽しめるために高品質のポッドキャストをウェブでスキャンしています。 これは最高のポッドキャストアプリで、Android、iPhone、そしてWebで動作します。 全ての端末で購読を同期するためにサインアップしてください。

 

クイックリファレンスガイド