Cloud Security Podcast cover image

Breaking and Building Serverless Application Security

Cloud Security Podcast

00:00

Application Logging

"We need other metrics about the environment in order to determine, like, whether something is actually breachor or not breached," he says. "It's just sort of taking that same mind set and applying it to every choke point as you work through your application." 'You can have this very rich source of data to help you goback and reconstruct a foreign incident,' another expert adds. "'I'm glad you got bout that b because youv letly have a lot of experience with the at least in sharing your experience with thewhole incident of ons conanthing' said one security engineer who was watching from his hotel room".

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app