
Sign up to save your podcasts
Or
Huxlee Barbee (@huxley_barbee, Head Security Prod Mktg @DataDogHQ) talks about the challenging odds of preventing security attacks, managing configuration mistakes, scaling security through monitoring, and security feedback loops in production.
SHOW: 555
CLOUD NEWS OF THE WEEK - http://bit.ly/cloudcast-cnotw
CHECK OUT OUR NEW PODCAST - "CLOUDCAST BASICS"
SHOW SPONSORS:
SHOW NOTES:
Topic 1 - Welcome to the show. Let’s start by talking a little bit about your background, and where you focus your attention these days.
Topic 2 -According to many reports, configuration mistakes tend to lead to the most security breaches. Who is typically making the mistakes?
Topic 3 - Can you dig deeper on the dynamics between security on the one hand and developers and SRE engineers on the other hand?
Topic 4 - So what are some of the strategies and tactics for achieving optimum balance between these opposing interests?
Topic 5 - Should we think about platform (infra) security apart from workload (application) security?
Topic 6 - Can you talk to us about the differences between applying security to things that happen pre-production (e.g. CI/CD, software-supply chains) and things that happen in production?
FEEDBACK?
4.6
147147 ratings
Huxlee Barbee (@huxley_barbee, Head Security Prod Mktg @DataDogHQ) talks about the challenging odds of preventing security attacks, managing configuration mistakes, scaling security through monitoring, and security feedback loops in production.
SHOW: 555
CLOUD NEWS OF THE WEEK - http://bit.ly/cloudcast-cnotw
CHECK OUT OUR NEW PODCAST - "CLOUDCAST BASICS"
SHOW SPONSORS:
SHOW NOTES:
Topic 1 - Welcome to the show. Let’s start by talking a little bit about your background, and where you focus your attention these days.
Topic 2 -According to many reports, configuration mistakes tend to lead to the most security breaches. Who is typically making the mistakes?
Topic 3 - Can you dig deeper on the dynamics between security on the one hand and developers and SRE engineers on the other hand?
Topic 4 - So what are some of the strategies and tactics for achieving optimum balance between these opposing interests?
Topic 5 - Should we think about platform (infra) security apart from workload (application) security?
Topic 6 - Can you talk to us about the differences between applying security to things that happen pre-production (e.g. CI/CD, software-supply chains) and things that happen in production?
FEEDBACK?
272 Listeners
283 Listeners
41 Listeners
584 Listeners
624 Listeners
284 Listeners
201 Listeners
108 Listeners
140 Listeners
989 Listeners
184 Listeners
186 Listeners
63 Listeners
138 Listeners
62 Listeners