Towards Data Science cover image

128. David Hirko - AI observability and data as a cybersecurity weakness

Towards Data Science

00:00

The Log for J Shell Vulnerability

The government said it was like a 10 out of 10 in terms of just the ability for it to be exploited. A lot of these kind of distributed processing systems are heavily reliant on Java and a lot of the Java libraries. And so, you know, we saw log for J and we saw kind of how it was being documented to exploit systems. We were just like, wow, like this is, this is days of data poisoning.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app