Podcasts

Episode #3: Threat Hunting In The Cloud for Fun and Profit

Anuj Malkapuram and Anton Chuvakin discuss the role machine learning has in threat management and the skills needed in new cybersecurity hires.

by Nikhil Chawla

Listen to the episode
2:49
3:37

Episode #3: Threat Hunting In The Cloud for Fun and Profit

Security practitioners, particularly incident responders, are awash in data. Historically, security event management (SEM) and in the last decade security information event management (SIEM) has been the industry’s response to getting signal from big and fast moving data. Think of signal as finding the needle in the haystack. The problem really is that there are too many needles. So, it becomes the needle in the needle stack. Meaning, there are so many alerts firing off…you don’t know which one matters. Advancements in analytics like machine learning coupled with the cloud (scale) have the promise to help.

Anton is the leading voice on this topic as an analyst now product leader at Google. Anuj is the person in the salt mines fighting the good fight. He runs one of the largest security analytics orgs in the world as SFDC. He also represents a modern threat hunter…who bring security, software development and data science together. The represent two sides of one “security information and event management” coin so to speak.

On the go? Listen to our podcast on your favorite platforms.

You might also like

The vendors you’re probably missing

The vendors you’re probably missing

While the seven data streams from our previous post will capture the majority of your vendor relationships, they’re primarily designed to find digital services and traditional procurement relationships. Today, we’re exploring the vendor categories that fall through the cracks of most discovery programs, as well as why they often represent some of your highest-risk relationships. […]

How to prepare your organization for a post-quantum world

How to prepare your organization for a post-quantum world

Quantum computing is on the horizon, and with it comes a seismic shift in how organizations must think about cybersecurity risk. The ability of future quantum machines to break today’s cryptographic protections, what we call quantum decryption, could undermine the trust, confidentiality, and resilience of digital business. This briefing series distills a highly technical topic […]

When will quantum decryption become practical?

When will quantum decryption become practical?

As part of Cybersecurity Awareness Month, we’re publishing this three-part series that distills a highly technical topic into strategic insights for leaders. Part 1 explained why quantum decryption poses a threat to current encryption systems. Part 2 lays out credible timelines for when the disruption may arrive. Part 3 will offer practical guidance on how […]

Cyber resiliency starts here.

Request Demo