Discover this podcast and so much more

Podcasts are free to enjoy without a subscription. We also offer ebooks, audiobooks, and so much more for just $11.99/month.

AIOps for Security and Breach Protection

AIOps for Security and Breach Protection

FromThe Cloudcast


AIOps for Security and Breach Protection

FromThe Cloudcast

ratings:
Length:
28 minutes
Released:
Mar 15, 2019
Format:
Podcast episode

Description

SHOW: 389DESCRIPTION: Brian talks with Adam Hunt (CTO and Chief Data Scientist at @RiskIQ) about the breadth of security breaches, how AI/ML can play a role if used properly, and immediate steps to improve protection for breaches.SHOW SPONSOR LINKS:Datadog Homepage - Modern Monitoring and AnalyticsTry Datadog yourself by starting a free, 14-day trial today. Listeners of this podcast will also receive a free Datadog T-shirtCLOUD NEWS OF THE WEEKAWS Announced Open Distro for ElasticSearchhttps://aws.amazon.com/blogs/opensource/keeping-open-source-open-open-distro-for-elasticsearch/Rebuttals or Commentary on Open Distro for ElasticSearch  https://www.elastic.co/blog/on-open-distros-open-source-and-building-a-companyhttps://thenewstack.io/what-the-fork-amazon/https://www.influxdata.com/blog/aws-intends-for-their-new-project-to-be-an-elasticsearch-fork/https://redmonk.com/sogrady/2019/03/15/cloud-open-source-powder-keg/Continuous Delivery Foundation launched by Linux Foundationhttps://devops.com/the-linux-foundation-launches-continuous-delivery-foundation/VC Investment in the Service Mesh spaceBouyant ($10M) Tetrate ($12.5M) SHOW INTERVIEW LINKS:RiskIQ - https://www.riskiq.com/Onboard Machine Learning Like a Junior Engineer - https://www.kdnuggets.com/2018/04/onboarding-machine-learning.htmlSHOW NOTES:Topic 1 - Welcome to the show. You have quite an interesting and impressive background. Can you talk a little bit about your work in academia prior to RiskIQ, and then what drew you to this space?Topic 2 - RiskIQ focuses on helping companies mitigate massive security attacks. For people that don’t live in the security domain, can you give us a sense of what one of these attacks and breaches look like? Topic 3 - Can you give us a sense of how many of these massive attacks are utilizing new techniques, or is it variants of existing techniques, or just old techniques looking for new (vulnerable) targets? And are there tools to help companies understand how to prioritize against these?  Topic 4 - Where are we in the industry in terms of the intersection of security best practices that IT teams can control, and when ML-driven capabilities can augment for more proactive security? Topic 5 - What are some of the things that you’re recommending to companies that are helping to make immediate impacts to them preventing or reducing massive breaches? Feedback?Email: show at thecloudcast dot netTwitter: @thecloudcastnet and @ServerlessCast
Released:
Mar 15, 2019
Format:
Podcast episode

Titles in the series (100)

The Cloudcast is the industry's leading, independent Cloud Computing podcast. Since 2011, co-hosts Aaron Delp & Brian Gracely have interviewed technology and business leaders that are shaping the future of computing. Topics will include Cloud Computing | Open Source | AWS | Azure | GCP | Serverless | DevOps | Big Data | ML | AI | Security | Kubernetes | AppDev | SaaS | PaaS | CaaS | IoT.