Confluent Developer ft. Tim Berglund, Adi Polak & Viktor Gamov cover image

Security for Real-Time Data Stream Processing with Confluent Cloud

Confluent Developer ft. Tim Berglund, Adi Polak & Viktor Gamov

00:00

Can We Scan This Port?

A lot of the big breaches that have happened in the last few years, they're not directly because of your third parties. They're because of your fourth party. And so that's part of the work that Jared's doing and that I'm doing is helping surface those in a much more easy to digest and track manner. The rabbit MQ was used for a while before I joined in 2020 almost two years ago in November. But the point that became painful was asking to add a single port to our scanning. So we were doing at that time something like, I think 80 ports internally and we had some other ports we brought in from external providers as well.

Play episode from 15:35
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app