Towards Data Science cover image

128. David Hirko - AI observability and data as a cybersecurity weakness

Towards Data Science

CHAPTER

The Log for J Vulnerability - What's the Difference?

The attack vector was exploiting a system that was well inside of, you know, probably most defensive parameters from a cybersecurity perspective. There weren't traditional kind of application firewalls that would be scanning this kind of traffic. It was something that we published and made everyone aware of. In our world, it was like, here's the future, right?

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner