Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ep 19: The atomic habits of cybersecurity professionals

In this Masters of Data episode, we welcome back Zoe Hawkins and Roland Palmer to discuss building better security practices through small, incremental improvements personally and professionally. We emphasize regularly auditing security policies to avoid unnecessary friction that forces workarounds, treating security as sociology rather than just technology. We cover practical approaches like habit-stacking, weekly business reviews, staying informed about threats through intentional news consumption, and developing cognitive humility with security prompts.

Ep 15: Beginner's guide to security tools

In this episode, we run through our beginner's guide to security tools, emphasizing the importance of people, processes, and technology. We chat about the NIST framework as a foundational resource for building security programs, highlighting key steps such as identifying and managing risks. We also discuss basic tools like password managers and multifactor authentication as essential for enhancing security, particularly against threats like phishing. Finally, we explore the integration of AI in security and its potential to improve efficiency while maintaining human oversight.

Ep 14: Security IS observability: Prove us wrong

In this episode, we discuss the critical intersection of security and observability within organizations. We highlight the often contentious relationship between security analysts and SREs, emphasizing the importance of fostering a collaborative culture to effectively address incidents. All teams should focus on solutions rather than blame, as user experience is affected by both security and infrastructure issues. We explore how to break down silos, especially in the context of AI security, and encourage cross-disciplinary learning to enhance overall security practices.

Ep 10: AI in the SOC

In this episode, we explore how AI is transforming security operations centers (SOCs) from basic log-watching teams into sophisticated threat-hunting command centers drowning in data. AI excels at processing security alerts faster than any human, but the challenge lies in balancing our growing dependence on algorithmic assistance with the irreplaceable value of human intuition in outsmarting creative attackers.

Ep 7: SOAR Loser: Does the O in SOAR stand for obsolete?

SOAR might sound like a superhero for security teams, but is it actually flying too close to the sun? In this episode, Adam and David unpack why security orchestration, automation, and response have been helpful… but might be headed for retirement, thanks to AI shaking up the game. They also dig into the headaches of managing clunky SOAR systems and why it’s time to rethink workflows and case management before you get left in the dust.

Ep 6: Security haven or horror story: from SIEMs to lakes to lakehouses

Between SIEMs, data lakes, and data lakehouses, the buzzwords alone could fill a glossary. In this episode, Adam and David break down the real differences between data lakes and SIEM systems and why effectively managing all that data is crucial for staying visible and secure. They also dive into how AI is shaking up the game and why picking the right tools can mean the difference between being overwhelmed and being in control.

Ep 4: Stop writing dumb AI security policies: use threat models, not fear

AI policy is not a yes/no question. Security isn’t here to be the morality police. Our job is to enable the business safely. Join security experts Adam White and David Girvin as they chat about the importance of using threat models, a simple framework, and five policy areas you are probably ignoring.