
Sign up to save your podcasts
Or
Huxlee Barbee (@huxley_barbee, Head Security Prod Mktg @DataDogHQ) talks about the challenging odds of preventing security attacks, managing configuration mistakes, scaling security through monitoring, and security feedback loops in production.
SHOW: 555
CLOUD NEWS OF THE WEEK - http://bit.ly/cloudcast-cnotw
CHECK OUT OUR NEW PODCAST - "CLOUDCAST BASICS"
SHOW SPONSORS:
SHOW NOTES:
Topic 1 - Welcome to the show. Let’s start by talking a little bit about your background, and where you focus your attention these days.
Topic 2 -According to many reports, configuration mistakes tend to lead to the most security breaches. Who is typically making the mistakes?
Topic 3 - Can you dig deeper on the dynamics between security on the one hand and developers and SRE engineers on the other hand?
Topic 4 - So what are some of the strategies and tactics for achieving optimum balance between these opposing interests?
Topic 5 - Should we think about platform (infra) security apart from workload (application) security?
Topic 6 - Can you talk to us about the differences between applying security to things that happen pre-production (e.g. CI/CD, software-supply chains) and things that happen in production?
FEEDBACK?
4.6
147147 ratings
Huxlee Barbee (@huxley_barbee, Head Security Prod Mktg @DataDogHQ) talks about the challenging odds of preventing security attacks, managing configuration mistakes, scaling security through monitoring, and security feedback loops in production.
SHOW: 555
CLOUD NEWS OF THE WEEK - http://bit.ly/cloudcast-cnotw
CHECK OUT OUR NEW PODCAST - "CLOUDCAST BASICS"
SHOW SPONSORS:
SHOW NOTES:
Topic 1 - Welcome to the show. Let’s start by talking a little bit about your background, and where you focus your attention these days.
Topic 2 -According to many reports, configuration mistakes tend to lead to the most security breaches. Who is typically making the mistakes?
Topic 3 - Can you dig deeper on the dynamics between security on the one hand and developers and SRE engineers on the other hand?
Topic 4 - So what are some of the strategies and tactics for achieving optimum balance between these opposing interests?
Topic 5 - Should we think about platform (infra) security apart from workload (application) security?
Topic 6 - Can you talk to us about the differences between applying security to things that happen pre-production (e.g. CI/CD, software-supply chains) and things that happen in production?
FEEDBACK?
377 Listeners
272 Listeners
283 Listeners
1,027 Listeners
41 Listeners
592 Listeners
624 Listeners
202 Listeners
110 Listeners
266 Listeners
181 Listeners
189 Listeners
64 Listeners
140 Listeners
52 Listeners