The Cloudcast

The Cloudcast (@cloudcastpod) is the industry's #1 Cloud Computing podcast, and the place where Cloud meets AI.  Co-hosts Aaron Delp (@aarondelp) & Brian Gracely (@bgracely) speak with technology and business leaders that are shaping the future of business. Topics will include Cloud Computing | AI | AGI | ChatGPT | Open Source | AWS | Azure | GCP | Platform Engineering | DevOps | Big Data | ML | Security | Kubernetes | AppDev | SaaS | PaaS . 

https://www.thecloudcast.net

subscribe
share






Security Visibility from Observability Data


Marc Tremsal (@mtremsal, Director Product Management @datadoghq) talks about the intersection of observability and security, if SRE needs a DevSecOps transition, using security data for modeling, and tips to make immediate impacts on overall security.

SHOW: 454

SHOW SPONSOR LINKS:

  • Studio 3T - Homepage
  • Studio 3T - 30 Day Free Trial
  • Taos Homepage
  • Taos - Gartner MQ - Cloud Professional Services
  • Datadog Security Monitoring Homepage - Modern Monitoring and Analytics
  • Try Datadog yourself by starting a free, 14-day trial today. Listeners of this podcast will also receive a free Datadog T-shirt

CLOUD NEWS OF THE WEEK - http://bit.ly/cloudcast-cnotw

PodCTL Podcast is Back (Enterprise Kubernetes) - http://podctl.com

SHOW NOTES:

  • Datadog Security Monitoring

Topic 1 - Welcome to the show. You’ve played a role in helping to design systems that secure some of the most critical environments in the world. Tell us a little bit about your background.

Topic 2 - We’ve talked about monitoring, observability and in various ways “security”, but how do you see all those things beginning to come together more these days? 

Topic 3 - As we get into more distributed environments, especially for security (authentication, encryption, key-management, proxies, etc.), how should people think about a framework to have visibility and be able to take action across these distributed systems? 

Topic 4 - Is this visibility of security-related activities (or potentially security-associated) mostly useful for real-time security threats (e.g. “we’re being attacked”), or can it also be used for more long-term types of activities (planning, threat modeling, chaos engineering, etc.)?

Topic 5 - Can you share with us any customer-centric stories of how this is helping companies deliver better services, or more uptime for their services?

Topic 6 - What are some tips you can share with the audience today that would help them make immediate impacts to how them monitor for security? 

FEEDBACK?

  • Email: show at thecloudcast dot net
  • Twitter: @thecloudcastnet


fyyd: Podcast Search Engine
share








 June 10, 2020  31m