Listen "How Common Identity Misconfigurations Can Undermine Cloud Security"
Episode Synopsis
Send us a textWelcome to a brand new cloud security podcast, Cloud Security Today. Instead of focusing on the latest news, we’re exploring a different take on cloud security where we dig deeper into its eclectic “how-to” side. On Cloud Security Today, we are going to talk with experts from all over the community so you can do cloud security better. Today’s experts are Nathaniel Quist (Q) and Jay Chen, and they will be talking about Unit 42’s latest cloud threat research. First up Q and J, as we call them, introduce listeners to their professional histories before telling us how they choose their research projects. We then talk to Q and Jay about findings from their latest report on identity and access management. Together, they explain some of the common vulnerabilities that come with identity and access management, like misconfigured roles. Toward the end of the episode, we talk to Q about cryptojacking, as he explains the nuances to mining coins maliciously, the various teams behind the act, and how they use code against each other. Key Points From This Episode:● How to become a threat researcher. Q and Jay share a little bit about their background.● Watch your roles and look out for wildcards in configurations!● APIs don’t always behave as expected – test them!Tweetables:“My biggest surprise is that even in a multi-million-dollar enterprise environment with thousands of workloads, thousands of EC2 instances and databases, they still make very fundamental mistakes.” — Jay Chen [0:09:55]“The cloud has the potential to be so much more granularly controlled than just a normal on-prem environment. From the outside looking in, it's very complex. Complexity can bring some obscurity within the cloud environment.” — Nathaniel Quist [0:17:00]Links Mentioned in Today’s Episode: Matt Chiodi on LinkedInMatt Chiodi on TwitterUnit 42 Cloud Threat ReportNathaniel Quist on LinkedInJay Chen on LinkedInIAMFinder tool on GitHubThe future of cloud security.Simplify cloud security with Prisma Cloud, the Code to Cloud platform powered by Precision AI.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.
More episodes of the podcast Cloud Security Today
From GTA to MFA
08/11/2025
CISO burnout and boardroom truths
01/09/2025
Iron Maiden and cloud security
14/07/2025
Navigating identity security
29/05/2025
The human side of cyber
22/04/2025
Principles in cyber leadership
23/03/2025
Rethinking security awareness
23/02/2025
Dr. Zero Trust on zero trust
20/01/2025
Cybersecurity compensation 2025
20/12/2024
LLMs: risks, rewards, and realities
20/11/2024
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.