The Cloudcast

AIOps for Security and Breach Protection


Listen Later

SHOW: 389

DESCRIPTION: Brian talks with Adam Hunt (CTO and Chief Data Scientist at @RiskIQ) about the breadth of security breaches, how AI/ML can play a role if used properly, and immediate steps to improve protection for breaches.

SHOW SPONSOR LINKS:

  • Datadog Homepage - Modern Monitoring and Analytics
  • Try Datadog yourself by starting a free, 14-day trial today. Listeners of this podcast will also receive a free Datadog T-shirt

CLOUD NEWS OF THE WEEK

AWS Announced Open Distro for ElasticSearch

https://aws.amazon.com/blogs/opensource/keeping-open-source-open-open-distro-for-elasticsearch/

Rebuttals or Commentary on Open Distro for ElasticSearch  

  • https://www.elastic.co/blog/on-open-distros-open-source-and-building-a-company
  • https://thenewstack.io/what-the-fork-amazon/
  • https://www.influxdata.com/blog/aws-intends-for-their-new-project-to-be-an-elasticsearch-fork/
  • https://redmonk.com/sogrady/2019/03/15/cloud-open-source-powder-keg/

Continuous Delivery Foundation launched by Linux Foundation
https://devops.com/the-linux-foundation-launches-continuous-delivery-foundation/

VC Investment in the Service Mesh space
Bouyant ($10M)
Tetrate ($12.5M

SHOW INTERVIEW LINKS:

  • RiskIQ - https://www.riskiq.com/
  • Onboard Machine Learning Like a Junior Engineer - https://www.kdnuggets.com/2018/04/onboarding-machine-learning.html

SHOW NOTES:

Topic 1 - Welcome to the show. You have quite an interesting and impressive background. Can you talk a little bit about your work in academia prior to RiskIQ, and then what drew you to this space?

Topic 2 - RiskIQ focuses on helping companies mitigate massive security attacks. For people that don’t live in the security domain, can you give us a sense of what one of these attacks and breaches look like? 

Topic 3 - Can you give us a sense of how many of these massive attacks are utilizing new techniques, or is it variants of existing techniques, or just old techniques looking for new (vulnerable) targets? And are there tools to help companies understand how to prioritize against these?  

Topic 4 - Where are we in the industry in terms of the intersection of security best practices that IT teams can control, and when ML-driven capabilities can augment for more proactive security? 

Topic 5 - What are some of the things that you’re recommending to companies that are helping to make immediate impacts to them preventing or reducing massive breaches?

Feedback?

  • Email: show at thecloudcast dot net
  • Twitter: @thecloudcastnet and @ServerlessCast
...more
View all episodesView all episodes
Download on the App Store

The CloudcastBy Massive Studios

  • 4.6
  • 4.6
  • 4.6
  • 4.6
  • 4.6

4.6

147 ratings


More shows like The Cloudcast

View all
The Changelog: Software Development, Open Source by Changelog Media

The Changelog: Software Development, Open Source

289 Listeners

The a16z Show by Andreessen Horowitz

The a16z Show

1,093 Listeners

Software Engineering Daily by Software Engineering Daily

Software Engineering Daily

623 Listeners

Talk Python To Me by Michael Kennedy

Talk Python To Me

583 Listeners

Soft Skills Engineering by Jamison Dance and Dave Smith

Soft Skills Engineering

288 Listeners

Super Data Science: ML & AI Podcast with Jon Krohn by Jon Krohn

Super Data Science: ML & AI Podcast with Jon Krohn

302 Listeners

NVIDIA AI Podcast by NVIDIA

NVIDIA AI Podcast

334 Listeners

Tech Brew Ride Home by Morning Brew

Tech Brew Ride Home

961 Listeners

Practical AI by Practical AI LLC

Practical AI

203 Listeners

AWS Podcast by Amazon Web Services

AWS Podcast

205 Listeners

The Real Python Podcast by Real Python

The Real Python Podcast

141 Listeners

Big Technology Podcast by Alex Kantrowitz

Big Technology Podcast

500 Listeners

This Day in AI Podcast by Michael Sharkey, Chris Sharkey

This Day in AI Podcast

228 Listeners

AI + a16z by a16z

AI + a16z

36 Listeners

The Pragmatic Engineer by Gergely Orosz

The Pragmatic Engineer

71 Listeners