Towards Data Science cover image

128. David Hirko - AI observability and data as a cybersecurity weakness

Towards Data Science

00:00

The Log for J Vulnerability - What's the Difference?

The attack vector was exploiting a system that was well inside of, you know, probably most defensive parameters from a cybersecurity perspective. There weren't traditional kind of application firewalls that would be scanning this kind of traffic. It was something that we published and made everyone aware of. In our world, it was like, here's the future, right?

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app