Podcasts

Episode #3: Threat Hunting In The Cloud for Fun and Profit

Anuj Malkapuram and Anton Chuvakin discuss the role machine learning has in threat management and the skills needed in new cybersecurity hires.

by Nikhil Chawla

Listen to the episode
2:49
3:37

Episode #3: Threat Hunting In The Cloud for Fun and Profit

Security practitioners, particularly incident responders, are awash in data. Historically, security event management (SEM) and in the last decade security information event management (SIEM) has been the industry’s response to getting signal from big and fast moving data. Think of signal as finding the needle in the haystack. The problem really is that there are too many needles. So, it becomes the needle in the needle stack. Meaning, there are so many alerts firing off…you don’t know which one matters. Advancements in analytics like machine learning coupled with the cloud (scale) have the promise to help.

Anton is the leading voice on this topic as an analyst now product leader at Google. Anuj is the person in the salt mines fighting the good fight. He runs one of the largest security analytics orgs in the world as SFDC. He also represents a modern threat hunter…who bring security, software development and data science together. The represent two sides of one “security information and event management” coin so to speak.

On the go? Listen to our podcast on your favorite platforms.

You might also like

Cybersecurity and insurance predictions for 2026

Cybersecurity and insurance predictions for 2026

The cyber threat landscape is evolving at breakneck speed, and the challenges organizations will face in 2026 look dramatically different from those of even a year ago. To understand what’s coming, we gathered insights from Resilience’s leading cybersecurity and cyber insurance experts: Dr. Ann Irvine, Chief Data and Analytics Officer; Chris Wheeler, CISO; David Meese, […]

Risk-based vendor tiering that actually works

Risk-based vendor tiering that actually works

Welcome back to the Resilience third-party management series. In our first three posts, we covered why third-party vendor discovery matters, how to locate vendors across your environment, and which high-risk vendor categories most organizations overlook. Now we turn to the next step: prioritizing those vendors based on actual cyber risk—not contract spend. Most vendor management […]

The vendors you’re probably missing

The vendors you’re probably missing

While the seven data streams from our previous post will capture the majority of your vendor relationships, they’re primarily designed to find digital services and traditional procurement relationships. Today, we’re exploring the vendor categories that fall through the cracks of most discovery programs, as well as why they often represent some of your highest-risk relationships. […]

Cyber resiliency starts here.

Request Demo