
Breakpoint Security Podcast
Neelu Tripathy
Breakpoint-'Exploring the depths of Defensive Security'. The defensive side of Security is a world in itself with teams achieving amazing feats that involve excellent engineering practices and smart optimisation for scale. This is not talked about enough in the industry. Join me in the br3akp0int podcast as we reflect on the methods and approaches these smart teams use to solve practical challenges in information security and innovate their way into the future. Who is this meant for? : This podcast is for anyone in InfoSec willing to know more about advances in security techniques. This includes security researchers or professionals, product owners, compliance or cloud, AI/ML, threat intel, SecOps automation, Security Leaders, development teams, pentesters and security practitioners. A bit about me: I am a technical security enthusiast and have been dabbling my hands at both offensive and defensive security. I am passionate about growing security communities and have spoken and trained at various security conferences.
All episodes
Best episodes
Seasons
Top 10 Breakpoint Security Podcast Episodes
Goodpods has curated a list of the 10 best Breakpoint Security Podcast episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to Breakpoint Security Podcast for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite Breakpoint Security Podcast episode by adding your comments to the episode page.

Br3akp0int Teaser
Breakpoint Security Podcast
01/21/23 • 0 min
Defensive Security: Although this forms the bulk of Information security, it is not talked about enough. Join me in the br3akp0int Security Podcast, where we go to depths and understand what the best Security teams do to operationalise excellent Security engineering practices across organisations and how do they really optimize for scale.
I would love to hear your suggestions and feedbacks, please DM me. If you liked this episode, please share with others in the community. It always means a lot!
If you’re interested in a security challenge that you’re facing or would like to hear from a specific speaker/team, let me know. Buzz me on Twitter or LinkedIn; checkout my handles below:
- Twitter: @NeeluTripathy
- LinkedIn: neelutripathy

Securing your Security Product | Sharukh Ahmad
Breakpoint Security Podcast
01/26/23 • 51 min
Topic: Securing Your Security Product
We start the season with Security Products. In this episode we look into the tricky areas when building Security products and how to address Security for those. We see how the perspective changes when we use the Security and developer lens and what to do about it. Also we dive into practical approaches to take for Security in the long run, which goes much beyond pen testing and/or bug bounty and brings about a robust defensive mindset.
Guest: Syed Shahrukh Ahmad
Co-founder BeVigil, SVigil @ CloudSEK
He is currently focused on building products and teams trying to build the next generation of attack surface monitoring and scanning tools at CloudSEK. He is a constant learner with deep interests in all things Security and building internet-scale ready software.
Shahrukh LinkedIn
BeVigil Mobile Webpage, BeVigil Mobile App
Recommended reading/viewing, Paper(on this topic) for practitioners
- Engineering tech blogs of major internet companies - Netflix, Spotify, Github, Google etc.
- Podcasts - Smashing Security, The Cloudcast, Malicious Life, and The Changelog
- AWS Security guides, HackerNews feed, always watching for open-source innovative security automation projects - for the constant inspiration, Research papers around mobile app security, privacy and AI targeted to flag internet security concerns.
- Mobile security - OWASP MSTG
I would love to hear your suggestions and feedbacks, please DM me. If you liked this episode, please share with others in the community. It always means a lot!
If you’re interested in a security challenge that you’re facing or would like to hear from a specific speaker/team, let me know. Buzz me on Twitter or LinkedIn; checkout my handles below:
- Twitter: @NeeluTripathy
- LinkedIn: neelutripathy

Securing your Security Product | Episode Teaser
Breakpoint Security Podcast
01/25/23 • 2 min
Stay tuned for our first guest- Syed Shahrukh Ahmad,
Co-founder BeVigil, CloudSEK
I would love to hear your suggestions and feedbacks, please DM me. If you liked this episode, please share with others in the community. It always means a lot!
If you’re interested in a security challenge that you’re facing or would like to hear from a specific speaker/team, let me know. Buzz me on Twitter or LinkedIn; checkout my handles below:
- Twitter: @NeeluTripathy
- LinkedIn: neelutripathy

Secrets Management | Ankit Khasgiwale
Breakpoint Security Podcast
02/09/23 • 52 min
Secrets management talks about the ways and methods of managing application secrets securely all through their lifecycle including storage, transit and use. This has been a tricky area for organisations to solve and has led to some significant breaches lately.
In this episode we discover some challenging scenarios when we try to implement secrets management across an organisation and discuss methods to deal with them.
Guest Intro: Ankit Khasgiwale
LinkedIn: @ankit
Ankit is Director of Product Security at Unacademy. He has over 16 years of experience in penetration testing, threat modelling, code reviews, DevSecOps and cloud security. At Unacademy, Ankit started the Product Security vertical from ground up which included setting up processes, team and automation to secure applications and infrastructure, remove secrets from source code, dependency issues etc.
Ankit has earlier worked at Microsoft India as Senior Program Manager and executed enterprise wide programs like Secrets management, rethinking Secure SDLC in Agile and setting up DevSecOps program. Additionally, Ankit has development experience in various technologies like Java, .Net, python and loves automating everything. In his free time he loves experimenting with wireless and RF hacking with SDRs and other types of hardware hacking.
Resources: Recommended reading/viewing for listeners
- https://www.beyondtrust.com/resources/glossary/secrets-management
- https://github.com/Yelp/detect-secrets
I would love to hear your suggestions and feedbacks, please DM me. If you liked this episode, please share with others in the community. It always means a lot!
If you’re interested in a security challenge that you’re facing or would like to hear from a specific speaker/team, let me know. Buzz me on Twitter or LinkedIn; checkout my handles below:
- Twitter: @NeeluTripathy
- LinkedIn: neelutripathy

Secrets Management | Episode Teaser
Breakpoint Security Podcast
02/07/23 • 2 min
Secrets management talks about the ways and methods of managing application secrets securely all through their lifecycle including storage, transit and use. This has been a tricky area for organisations to solve and has led to some significant breaches lately.
Episode RELEASE DATE: 09th Feb, 2023
Guest Intro: Ankit Khasgiwale
Ankit is Director of Product Security at Unacademy. He has over 16 years of experience in penetration testing, threat modelling, code reviews, DevSecOps and cloud security. At Unacademy, Ankit started the Product Security vertical from ground up which included setting up processes, team and automation to secure applications and infrastructure, remove secrets from source code, dependency issues etc.
Ankit has earlier worked at Microsoft India as Senior Program Manager and executed enterprise wide programs like Secrets management, rethinking Secure SDLC in Agile and setting up DevSecOps program. Additionally, Ankit has development experience in various technologies like Java, .Net, python and loves automating everything. In his free time he loves experimenting with wireless and RF hacking with SDRs and other types of hardware hacking.
I would love to hear your suggestions and feedbacks, please DM me. If you liked this episode, please share with others in the community. It always means a lot!
If you’re interested in a security challenge that you’re facing or would like to hear from a specific speaker/team, let me know. Buzz me on Twitter or LinkedIn; checkout my handles below:
- Twitter: @NeeluTripathy
- LinkedIn: neelutripathy

#S02EP06 (MITRE) ATT&CK in your Backyard | Shweta Kshirasagar
Breakpoint Security Podcast
10/28/23 • 50 min
MITRE ATT&CK has been the go-to framework for both offensive & defensive security teams. It’s sophistication and vast coverage makes it quite comprehensive, often not easy to fathom, let alone implement to the fullest. In this episode of br3akp0int, we demystify this through practical scenarios & Shweta’s experience of implementing it in day-to-day activities of Cyber Defenders.
Guest: Shweta Kshirsagar, General Manager - Security Assurance, Airtel Africa
Shweta is an accomplished information security professional with 18 years of industry experience in various domains of Cyber Security such as Cyber Incident Response, Data Protection and Privacy, Information Security Audit and Compliance. Possess strong leadership skills with a collaborative approach towards driving cross-functional programs. Holds multiple professional certifications and has won awards and recognition in the industry.
Recommended reading/viewing for practitioners:
- Mitre Att&ck Framework & website: https://attack.mitre.org/matrices/enterprise/
- https://github.com/mitre-attack
- https://center-for-threat-informed-defense.github.io/attack-sync/
- https://redcanary.com/blog/avoiding-common-attack-pitfalls/
- https://www.inforisktoday.in/insights-from-dual-vendor-saas-based-siem-implementation-a-22207
I would love to hear your suggestions and feedbacks, please DM me. If you liked this episode, please share with others in the community. It always means a lot!
If you’re interested in a security challenge that you’re facing or would like to hear from a specific speaker/team, let me know. Buzz me on Twitter or LinkedIn; checkout my handles below:
- Twitter: @NeeluTripathy
- LinkedIn: neelutripathy

Proactive Threat Prevention with Threat Intelligence | Avkash Kathiriya | Full Ep.
Breakpoint Security Podcast
04/14/23 • 71 min
TOPIC: Proactive Threat Prevention with Threat Intelligence
In this episode, we discuss the challenges of Threat Intelligence in the modern Threat landscape and how security teams can conduct Threat Intelligence to Proactively Stop Advanced Attacks.
Guest: Avkash Kathiriya, Sr. VP - Research and Innovation at Cyware Labs
Avkash is the VP of Research at a US-based Cyber security product startup. Avkash is an astute cybersecurity professional with more than 13 years of experience in core security technology domains including Cyber Defense, Security Orchestration and Automation, Cyber Resiliency, Threat Hunting, and Threat Intelligence. Apart from leading the research and innovation at Cyware, Avkash is also a globally well-known speaker at various security conferences in India and abroad. He is also a visiting faculty member at IIIT, Sri City, and a Cyber Threat Intelligence Committee member at OASIS, a global non-profit consortium that works on the development, convergence, and adoption of open standards for cybersecurity.
Glossary
We might be frequently using some common terminologies in our conversation, the way they're used in the industry, so those new to this can refer to the quick glossary given below before you start
- CTI: Cyber Threat Intel
- TTPs: tactics, techniques, and procedures
- APT: advanced persistent threats- in which an attacker gains access and stays without being detected for long time.
- SIEM: Security Info Event Management
- SOC: Security Operations Center
- IoC: Indicators of Compromise
- IoA: Indicators of Attack
Recommended reading/viewing, Paper(in this topic) for practitioners
- https://github.com/hslatman/awesome-threat-intelligence
- https://oasis-open.github.io/cti-documentation/stix/intro.html
- https://cyware.com/educational-guides/cyber-threat-intelligence
- https://cyware.com/blog/4-steps-to-expand-threat-intelligence-sharing-in-2023-f786
- https://www.youtube.com/watch?v=I9pjBrN1dUA
I would love to hear your suggestions and feedbacks, please DM me. If you liked this episode, please share with others in the community. It always means a lot!
If you’re interested in a security challenge that you’re facing or would like to hear from a specific speaker/team, let me know. Buzz me on Twitter or LinkedIn; checkout my handles below:
- Twitter: @NeeluTripathy
- LinkedIn: neelutripathy

#S02EP03 DevSecOps for teams building on Steroids | Akash Mahajan
Breakpoint Security Podcast
09/15/23 • 51 min
TOPIC: DevSecOps for teams building on Steroids
Developers have already adopted public cloud in all tech enabled companies and industry verticals. Security teams are mostly for after the fact testing, signaling that compliance is in place or even as a sales aid when selling to large enterprises.
If Continuous Delivery is the goal (as that gets the business money) then the integration and deployment pipelines (CI/CD) are the assembly lines. Far too often under the misguided notions of shift left, security teams come and slow things down by adding security steps to such pipelines and are surprised when no one likes this.
This is what he was able to solve for Byjus enterprise business team and they presented this at DevOps Enterprise Summit 2021 Europe as well.
Guest: Akash Mahajan, Founder & CEO Kloudle,Appsecco
Before founding Kloudle, Akash started Appsecco in 2015. At Appsecco, they did security testing of products hosted in the public cloud. They tested 100s of applications. But instead of app bugs, they found most of the time cloud infra was misconfigured.
Humans make mistakes. So far most developers are human too. Project after project they hacked into customer's apps due to cloud misconfigurations. Therefore, they built Kloudle.
Kloudle automates cloud security to eliminate human errors in setting up and using cloud infrastructure. It answers 3 things. What's running, what's wrong, how to fix it. Automatically in a loop. A CSPM built for devs.
Recommended reading/viewing, for practitioners:
- The Phoenix Project [https://www.amazon.in/Phoenix-Project-Devops-Helping-Business/dp/1942788290]
- The Goal [https://amzn.eu/d/ebKsrd6]
- Accelerate [https://amzn.eu/d/41jhgu6]
- DORA Metrics [https://cloud.google.com/blog/products/devops-sre/using-the-four-keys-to-measure-your-devops-performance]
- Turtles All The Way Down
- Scaling Enterprise BizOps by Automating DevOps Practices
- https://github.com/devopsenterprise/2021-virtual-europe/blob/main/PPT%20revamp%20-%20DevOps%20Enterprise%20Summit%20v6%20(2).pdf
I would love to hear your suggestions and feedbacks, please DM me. If you liked this episode, please share with others in the community. It always means a lot!
If you’re interested in a security challenge that you’re facing or would like to hear from a specific speaker/team, let me know. Buzz me on Twitter or LinkedIn; checkout my handles below:
- Twitter: @NeeluTripathy
- LinkedIn: neelutripathy

#S02EP09 | Controlling your SaaS Sprawl with a SaaS Security Platform | Abhishek Anand
Breakpoint Security Podcast
12/29/23 • 57 min
Just like cloud is omnipresent in 2023, SaaS sprawl is just as prevalent. A company on an average uses 110 SaaS apps and broadly 70% of the software that is being run is SaaS with issues even more severe at enterprise level.
SaaS security today is thought of as an IAM problem solved with an SSO integration but issues go beyond that, with misconfigurations leading to leaked data, insecure SaaS plugins opening up new threat vectors and how your services talk to other SaaS apps.
A lot of cloud security issues can be solved in orgs with good engineering practices but SaaS security is harder because users are spread across the organization and each tool has its own nuances, so IT/security teams find it hard to manage well. The general practice of allowing users to bring their own plugins and ways of use around SaaS apps is what creates security issues.
In this episode, we dive deep into SSP implementations for organisations.
Guest: Abhishek Anand, Co-Founder Koala Lab
Abhishek is a technology leader who built Housingdotcom as CTO and most recently built cloud infra at Whitehat Jr, where he led the platform and SRE teams. Over the course of his career, he has solved varied security problems and is currently building KoalaLab based on inspiration during his time building and securing infrastructure for these fast-growing companies.
Recommended reading/viewing for practitioners:
- SaaS Sprawl: https://www.zippia.com/advice/saas-industry-statistics
- 38% of companies run almost entirely on SaaS
- As of 2021, an average of 110 SaaS apps are used per organization.
- Approximately 70% of total company software use is SaaS as of 2022. However, this number has the potential to reach up to 85% by 2025, indicating that SaaS as software will only continue to become more popular.
- Salesforce leak of data: https://krebsonsecurity.com/2023/04/many-public-salesforce-sites-are-leaking-private-data/
- Google drive leaks: https://ny.chalkbeat.org/2021/8/5/22612388/data-breach-nyc-students-staff-google-drive
- Case: https://www.wired.co.uk/article/nhs-covid-19-app-health-status-future
- TL;DR: https://tldrsec.com/- Good newsletter covering a lot of security research
- SSP Coverage Reference: https://www.koalalab.com/saas-security
I would love to hear your suggestions and feedbacks, please DM me. If you liked this episode, please share with others in the community. It always means a lot!
If you’re interested in a security challenge that you’re facing or would like to hear from a specific speaker/team, let me know. Buzz me on Twitter or LinkedIn; checkout my handles below:
- Twitter: @NeeluTripathy
- LinkedIn: neelutripathy

#S03EP04 AI for Security And Security For AI | Tamaghna Basu
Breakpoint Security Podcast
08/23/24 • 60 min
In this episode, we delve into the intricate world of AI security, tackling the dual challenge of safeguarding artificial intelligence systems and utilizing AI to enhance cybersecurity.
Guest: Tamaghna Basu, Founder & CEO, DeTaSECURE
Join us as we unravel the complexities of AI security and provide valuable insights that can help you stay ahead in the ever-evolving cybersecurity landscape. Whether you're a security professional, an AI enthusiast, or simply curious about the intersection of these fields, this episode offers critical knowledge and practical tips to enhance your understanding and approach to AI security.
Glossary for Listeners
Artificial Intelligence (AI) is the creation of computer systems that can perform tasks normally requiring human intelligence. This includes recognizing speech, making decisions, and learning from data. Imagine a smart assistant like Siri or Alexa—they use AI to understand and respond to your requests.
Machine Learning (ML)
- A subset of AI focused on developing algorithms that allow computers to learn from and make predictions or decisions based on data.
Neural Networks
- Computational models inspired by the human brain, consisting of interconnected nodes (neurons) that process information in layers to recognize patterns and make decisions.
Natural Language Processing (NLP)
- A branch of AI that enables machines to understand, interpret, and respond to human language in a natural way, including tasks like translation, sentiment analysis, and chatbots.
Deep Learning
- A type of machine learning involving neural networks with many layers (deep neural networks), which excel at analyzing large datasets and performing complex tasks such as image and speech recognition.
Adversarial Attacks
- Techniques used to deceive AI models by introducing malicious input, causing the model to make incorrect predictions or classifications, highlighting vulnerabilities in AI systems.
Recommended reading/viewing for practitioners:
- Tamaghna’s BackHat Talk- Clone with AI : https://www.youtube.com/watch?v=XafJT7I71yo
- Adversarial Attacks: https://youtu.be/t5-vMJDFr8E
- T-Mobile Breach: https://www.t-mobile.com/news/network/cyberattack-against-tmobile-and-our-customers
- Samsung bans ChatGPT: https://www.forbes.com/sites/siladityaray/2023/05/02/samsung-bans-chatgpt-and-other-chatbots-for-employees-after-sensitive-code-leak/
- OpenAI Data Breach: https://openai.com/index/march-20-chatgpt-outage/
Follow us on LinkedIn: @breakpoint-security-podcast
Audio on Buzzsprout: https://breakpoint.buzzsprout.com
I would love to hear your suggestions and feedbacks, please DM me. If you liked this episode, please share with others in the community. It always means a lot!
If you’re interested in a security challenge that you’re facing or would like to hear from a specific speaker/team, let me know. Buzz me on Twitter or LinkedIn; checkout my handles below:
- Twitter: @NeeluTripathy
- LinkedIn: neelutripathy
Show more best episodes

Show more best episodes
FAQ
How many episodes does Breakpoint Security Podcast have?
Breakpoint Security Podcast currently has 37 episodes available.
What topics does Breakpoint Security Podcast cover?
The podcast is about Information Security, Compliance, Podcasts and Technology.
What is the most popular episode on Breakpoint Security Podcast?
The episode title '#S02EP09 | Controlling your SaaS Sprawl with a SaaS Security Platform | Abhishek Anand' is the most popular.
What is the average episode length on Breakpoint Security Podcast?
The average episode length on Breakpoint Security Podcast is 40 minutes.
How often are episodes of Breakpoint Security Podcast released?
Episodes of Breakpoint Security Podcast are typically released every 13 days, 23 hours.
When was the first episode of Breakpoint Security Podcast?
The first episode of Breakpoint Security Podcast was released on Jan 21, 2023.
Show more FAQ

Show more FAQ