Data Engineering Podcast cover image

ThreatStack: Data Driven Cloud Security with Pete Cheslock and Patrick Cable - Episode 25

Data Engineering Podcast

00:00

How Do You Determine When to Alert Your Users?

We're essentially kind of behavior based, right? Like identifying maybe risky behaviors that could lead to a breach. The goal being ase obvisy can identify it before it happens. So we don't use signatures. It's just based on basic rules for tools that are typically associated with exploits and stuffh like that. Yout alwaso really basic rule. If you're trying to identify for data expiltration, you know, for for again, lennox is what we're talking about. There are usually only so many ways to get data off a lennox server.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app