Featured
Data Security Questions E5: How Do I Use Data Context for Post-Breach Response?
Andy Singer & Ash Nuckols
The Open Raven team addresses how SOC analysts can use data context to accelerate post-breach response and containment actions.
All episodes
-
Data Security Questions E1: Is My Sensitive Data is in the Wrong Region?
Christopher Webber
The Open Raven team shows how to determine if sensitive data resides in the wrong geographic region.
-
Data Security Questions E2: How Do I Discover Shadow Data and Take Action?
Christopher Webber & Bryan Jones
The Open Raven team shows how to discover shadow data and take action.
-
Data Security Questions E3: How Do I Find and Secure Developer Secrects?
Andy Singer & Bryan Jones
The Open Raven team discusses the security problems posed by exposed or unencrypted developer secrets, how to discover and classify them, and how to apply guardrails so they are properly secured.
-
Data Security Questions E4: How do I find and secure PII data?
Tara Gould & Michael Ness Open Raven Security Research
The Open Raven Team discusses data breaches involving PII and how complete scanning vs sampling can help prevent them.
-
Data Security Questions E5: How Do I Use Data Context for Post-Breach Response?
Andy Singer & Ash Nuckols
The Open Raven team addresses how SOC analysts can use data context to accelerate post-breach response and containment actions.