MCP Security at Wiz with Rami McCarthy

MCP Security at Wiz with Rami McCarthy

Up next

Inside China’s Great Firewall with Jackson Sippe

China’s Great Firewall is often spoken about but is rarely understood. It is one of the most sophisticated and opaque censorship systems on the planet, and it shapes how over a billion people interact with the global internet, influences the design of privacy and proxy tools worl ...  Show more

Optimizing Agent Behavior in Production with Gideon Mendels

LLM -powered systems continue to move steadily into production, but this process is presenting teams with challenges that traditional software practices don’t commonly encounter. Models and agents are non-deterministic systems, which makes it difficult to test changes, reason abo ...  Show more

Recommended Episodes

State of Cloud Security 2024 - Leadership Edition
Cloud Security Podcast

Leadership Insights on Cloud Security in 2024. Ashish sat down with return guest Srinath Kuruvadi, a seasoned cloud security leader with over two decades of experience in the field. T ...

  Show more

PP049: CSMM – A Practical Model for Improving Your Cloud Security
Packet Protector

The Cloud Security Maturity Model (CSMM) is a practical blueprint for improving the security of your public cloud deployments. Developed in partnership with the Cloud Security Alliance, IANS, and Securosis, the model covers 12 categories, such as network security and application ...  Show more

PP031: Cloud Firewall Architecture Essentials
Packet Protector

Today on Packet Protector we look at cloud firewall architectures. If you’ve deployed firewalls in the campus or a data center, it’s useful to know that there are differences in the public cloud. We’ll dive into what you need to know, including deployment options, the role of hig ...  Show more

Tech Bytes: Embedding Network Security Into Your Cloud Network (Sponsored)
Tech Bytes

Today on the Tech Bytes podcast we’re talk network security at scale. That is, in a cloud environment, how can you build security capabilities and features into the network while also being able to keep up with security policies, operations, compliance, and more. Our sponsor is A ...  Show more