Cloud security is becoming increasingly complex with generative AI making cyber threats even more sophisticated. In this video, Or Shoshani, CEO at Stream Security, talks about some of the key challenges organizations are facing and the new threats generative AI is posing, saying, “Right now, I believe that there are multiple new attacks that may already have gone under the radar.” He takes a deep dive into the topic and explains how Stream Security’s multi-cloud solution is helping organizations tackle these challenges.
Cloud security in the AI era with Stream Security CEO
- Shoshani discusses how AI is making security threats more sophisticated.
- Shoshani explains how hyperscalers are building private clouds and the challenges associated with securing them. Stream Security is democratizing these capabilities for their customers and partners.
Cloud security challenges and solutions
- Stream Security focuses on the cloud layer, covering identities, machines, and networking.
- Shoshani tells us adversaries can steal identities and credentials within minutes which is why it is crucial to be able to build a comprehensive story of the cloud to allow you to detect straight away and respond.
- Stream Security is a multi-cloud solution and Shoshani discusses how it is necessary to understand how the business is built through different cloud providers to get the full story so you can secure everything.
Cloud security threats and generative AI’s impact
- From the analysis of the millions of workloads and events from customers, Shoshani tells us that identity is a key security threat in the cloud, with most attacks starting from stolen credentials.
- Generative AI is making these cyber threats increasingly sophisticated in cloud security.
AI security threats and best practices for organizations
- Shoshani talks about three key challenges of the increasing reliance on cloud computing and AI: the need for robust management of identities, permissions, and configurations, new complexities in securing AI pipelines, and additional vulnerabilities from the integration of generated AI code.
- New AI-powered attacks are emerging requiring new detection capabilities and security practices and Shoshani believes that multiple new attacks may already have gone undetected.
Cloud and Stream Security best practices
- Shoshani recommends organizations empower DevOps teams and developers to think early on about security to build a secure environment.
- Security is most effective when responsibility is decentralized, with colleagues across different groups taking ownership of security measures.
- Shoshani discusses the four key best practices for cloud security to build and run a secure environment, including setup, configuration management, threat detection, and XDR.
Guest: Or Shoshani (LinkedIn)
Company: Stream Security
Show: Let’s Talk
This summary was written by Emily Nicholls.





