Thanks for visiting The Cell Phone Junkie! I will be taking the time each week to discuss my favorite topic, cell phones. Any feedback is appreciated and welcome. You can email me at: questions (AT) thecellphonejunkie (DOT) com or call: 206-203-3734 Thanks and welcome!
…
continue reading
İçerik Anton Chuvakin tarafından sağlanmıştır. Bölümler, grafikler ve podcast açıklamaları dahil tüm podcast içeriği doğrudan Anton Chuvakin veya podcast platform ortağı tarafından yüklenir ve sağlanır. Birinin telif hakkıyla korunan çalışmanızı izniniz olmadan kullandığını düşünüyorsanız burada https://tr.player.fm/legal özetlenen süreci takip edebilirsiniz.
Player FM - Podcast Uygulaması
Player FM uygulamasıyla çevrimdışı Player FM !
Player FM uygulamasıyla çevrimdışı Player FM !
EP96 Cloud Security Observability for Detection and Response
MP3•Bölüm sayfası
Manage episode 346978000 series 2892548
İçerik Anton Chuvakin tarafından sağlanmıştır. Bölümler, grafikler ve podcast açıklamaları dahil tüm podcast içeriği doğrudan Anton Chuvakin veya podcast platform ortağı tarafından yüklenir ve sağlanır. Birinin telif hakkıyla korunan çalışmanızı izniniz olmadan kullandığını düşünüyorsanız burada https://tr.player.fm/legal özetlenen süreci takip edebilirsiniz.
Guest:
- Jeff Bollinger, Director of Incident Response and Detection Engineering @ Linkedin
Topics:
- Observability sounds cool (please define it for us BTW), but relating it to security has been "hand-wavy" at best. What is your opinion on the relevance of observability data for security use cases? What use cases are those, apart from saving the data for IR just in case?
- How can we best approach observability in the cloud, particularly around network communications, so that we improve security as a result?
- Are there other areas of cloud where observability might be more relevant? Does the massive shift to TLS 1.3 impact this?
- If the Internet is shifting towards an end-user/device centric model with everything as a service (SaaS), how does security monitoring even work anymore?
- Does it mean the end of both endpoint and network eras and the arrival of the application security monitoring era?
- Can we do deep monitoring of complex applications and app clusters for abuse or should we just focus on identity and profiling?
Resources:
- "Instrumenting Modern Application Stack for Detection and Response" (ep34)
- "Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan" by Jeff Bollinger, Brandon Enright, Matthew Valites (book)
- RFC 7258 Pervasive Monitoring Is an Attack
- RFC 8890 Internet is for end users
- "(Re)building Threat Detection and Incident Response at LinkedIn"
- "Martian Chronicles" by Ray Bradberry (because migrating to cloud is like flying to Mars)
258 bölüm
MP3•Bölüm sayfası
Manage episode 346978000 series 2892548
İçerik Anton Chuvakin tarafından sağlanmıştır. Bölümler, grafikler ve podcast açıklamaları dahil tüm podcast içeriği doğrudan Anton Chuvakin veya podcast platform ortağı tarafından yüklenir ve sağlanır. Birinin telif hakkıyla korunan çalışmanızı izniniz olmadan kullandığını düşünüyorsanız burada https://tr.player.fm/legal özetlenen süreci takip edebilirsiniz.
Guest:
- Jeff Bollinger, Director of Incident Response and Detection Engineering @ Linkedin
Topics:
- Observability sounds cool (please define it for us BTW), but relating it to security has been "hand-wavy" at best. What is your opinion on the relevance of observability data for security use cases? What use cases are those, apart from saving the data for IR just in case?
- How can we best approach observability in the cloud, particularly around network communications, so that we improve security as a result?
- Are there other areas of cloud where observability might be more relevant? Does the massive shift to TLS 1.3 impact this?
- If the Internet is shifting towards an end-user/device centric model with everything as a service (SaaS), how does security monitoring even work anymore?
- Does it mean the end of both endpoint and network eras and the arrival of the application security monitoring era?
- Can we do deep monitoring of complex applications and app clusters for abuse or should we just focus on identity and profiling?
Resources:
- "Instrumenting Modern Application Stack for Detection and Response" (ep34)
- "Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan" by Jeff Bollinger, Brandon Enright, Matthew Valites (book)
- RFC 7258 Pervasive Monitoring Is an Attack
- RFC 8890 Internet is for end users
- "(Re)building Threat Detection and Incident Response at LinkedIn"
- "Martian Chronicles" by Ray Bradberry (because migrating to cloud is like flying to Mars)
258 bölüm
Tüm bölümler
×Player FM'e Hoş Geldiniz!
Player FM şu anda sizin için internetteki yüksek kalitedeki podcast'leri arıyor. En iyi podcast uygulaması ve Android, iPhone ve internet üzerinde çalışıyor. Aboneliklerinizi cihazlar arasında eş zamanlamak için üye olun.