Podcasts

Episode #3: Threat Hunting In The Cloud for Fun and Profit

Anuj Malkapuram and Anton Chuvakin discuss the role machine learning has in threat management and the skills needed in new cybersecurity hires.

by Nikhil Chawla

Listen to the episode
2:49
3:37

Episode #3: Threat Hunting In The Cloud for Fun and Profit

Security practitioners, particularly incident responders, are awash in data. Historically, security event management (SEM) and in the last decade security information event management (SIEM) has been the industry’s response to getting signal from big and fast moving data. Think of signal as finding the needle in the haystack. The problem really is that there are too many needles. So, it becomes the needle in the needle stack. Meaning, there are so many alerts firing off…you don’t know which one matters. Advancements in analytics like machine learning coupled with the cloud (scale) have the promise to help.

Anton is the leading voice on this topic as an analyst now product leader at Google. Anuj is the person in the salt mines fighting the good fight. He runs one of the largest security analytics orgs in the world as SFDC. He also represents a modern threat hunter…who bring security, software development and data science together. The represent two sides of one “security information and event management” coin so to speak.

On the go? Listen to our podcast on your favorite platforms.

You might also like

Understanding identity-based attacks and how to defend against them

Understanding identity-based attacks and how to defend against them

Breaches used to be primarily carried out via software vulnerabilities: Companies would announce a flaw, take a while to fix it, and attackers would find their way into the system using those exploits. From there they might not only steal information and assets from their primary target, but would also use their access to jump […]

Get ready for threats both old and new in 2025

Get ready for threats both old and new in 2025

It’s prediction season and while no one can see into the future, we can definitely take some educated guesses. From increasingly severe ransomware attacks to deepfakes that deceive Fortune 500 companies, we’re keeping an eye out for some major events in 2025. And while many organizations are taking steps to beef up their defenses, the […]

Contrasting and comparing FAIR with the Resilience solution

Contrasting and comparing FAIR with the Resilience solution

As market awareness of cyber risk quantification grows, we frequently receive questions from clients and curious risk managers about FAIR (Factor Analysis of Information Risk)—what it is, whether it truly provides accurate cyber risk quantification, the effort needed to set it up and maintain, and more. Clients often ask us to compare the FAIR methodology […]

Cyber resiliency starts here.

Request Demo