Redefining CyberSecurity

Automated Behavioral Fingerprinting: The Key to Cloud Security | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From RSA Conference 2024 | A RAD Security Story with Brooke Motta

Episode Summary

Cloud native development is the biggest threat facing security teams today. For teams to achieve true resilience against emerging threats, detection and response solutions must evolve their approach beyond signature-based, one-size-fits-all solutions. RAD Security removes the blind spots of legacy tools, closing the gap for prioritization and remediation in cloud native infrastructure. Listen to this new episode of "7 Minutes on ITSPmagazine" to hear RAD Security's Brooke Motta share their latest Innovation Short Brand Story.

Episode Notes

When you are only looking for malicious indicators, you will NEVER get security teams in control of the rapidly evolving threats to their organizations. When Brooke Motta's co-founder, Jimmy Mesta, was a security architect, and consulting companies on Kubernetes security at the very start of containerization, he witnessed a paradigm shift to defining your environment in a declarative way, through code. He decided to apply this paradigm shift toward a positive security model.

To this end, RAD Security was born. RAD Security creates fingerprints of known good behavior and notifies on drift from that behavior. RAD Security have built fingerprints for cloud native workloads, identities, and infrastructure to detect attacks through meaningful drift that signifies attacker behavior. RAD Security have also built a real-time posture model that can accept the data from our drift engine, so teams can constantly refine their shift-left efforts with the best data possible. By necessity, RAD Security have the first runtime agent that would automate the creation of these behavioral fingerprints.

Today, teams use RAD Security’s industry-first positive security model for their zero trust initiatives, posture management for cloud native infrastructure, and detection of zero days in runtime. RAD Security's mission is to empower engineering and security teams to push boundaries, build technology and drive innovation so they can focus on growth versus security problems. In today’s environment, attackers are more versed in cloud native security than security teams.

RAD Security removes the blind spots of legacy tools, closing the gap for prioritization and remediation in cloud native infrastructure. To learn more, meet with Brooke Motta and her RAD Security co-founder Jimmy Mesta at the Innovation Sandbox on Monday, May 6th, where they will be participating in the pitch contest.

Learn more about RAD Security: https://itspm.ag/radsec-l33tz

Note: This story contains promotional content. Learn more.

Guest: Brooke Motta, CEO and Co-Founder of RAD Security [@RADSecurity_]

On LinkedIn | https://www.linkedin.com/in/brookemotta/

On Twitter | https://twitter.com/brookelynz1

Resources

RAD Security Blog: https://itspm.ag/radsec-477a54

Learn more and catch more stories from RAD Security: https://www.itspmagazine.com/directory/rad-security

View all of our RSA Conference Coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage

Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programs

Newsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/

Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-up

Are you interested in telling your story?
https://www.itspmagazine.com/telling-your-story

Episode Transcription

Automated Behavioral Fingerprinting: The Key to Cloud Security | A Short Brand Innovation Story From RSA Conference 2024 | A RAD Security Story with Brooke Motta

Please note that this transcript was created using AI technology and may contain inaccuracies or deviations from the original audio file. The transcript is provided for informational purposes only and should not be relied upon as a substitute for the original recording, as errors may exist. At this time, we provide it “as it is,” and we hope it can be helpful for our audience.

_________________________________________