Brian Vallelunga
👤 PersonAppearances Over Time
Podcast Appearances
Um, and it was from what I, what we heard, it was quite a bit of a battle between the hackers and like, just because you wrote the key. Well, if they use that key to grant, to create new keys, now you're like, you have this cat and mouse game. Right. Um, and so it was quite a big challenge for them.
Um, and it was from what I, what we heard, it was quite a bit of a battle between the hackers and like, just because you wrote the key. Well, if they use that key to grant, to create new keys, now you're like, you have this cat and mouse game. Right. Um, and so it was quite a big challenge for them.
Uh, post Doppler, they, uh, have a secret station set up a whole level of orchestration with their infrastructure. And that same thing would have taken about like 30 seconds to a minute. They'd clicked a button and it'd been done. But, yeah, it was quite painful for them. And you can imagine all the users that were deeply impacted by that along the way. It's not fun.
Uh, post Doppler, they, uh, have a secret station set up a whole level of orchestration with their infrastructure. And that same thing would have taken about like 30 seconds to a minute. They'd clicked a button and it'd been done. But, yeah, it was quite painful for them. And you can imagine all the users that were deeply impacted by that along the way. It's not fun.
I think that the surprising thing is like that I hear a lot is, oh, this won't happen to me because my company is really big and we had the best security team. Or I also hear the quite another inverse, which happens all the time of like, I'm a small startup. Hackers won't care about my company. Right.
I think that the surprising thing is like that I hear a lot is, oh, this won't happen to me because my company is really big and we had the best security team. Or I also hear the quite another inverse, which happens all the time of like, I'm a small startup. Hackers won't care about my company. Right.
And like you hear this from both from the opposite sides, like the stars are saying one thing that the big companies are saying the other. And the truth is hackers are just looking for any company that they can exploit. Does not matter big and small. They're looking for prices. Sometimes they hit a jackpot million dollar payout. Sometimes they get a 10K payout. Right.
And like you hear this from both from the opposite sides, like the stars are saying one thing that the big companies are saying the other. And the truth is hackers are just looking for any company that they can exploit. Does not matter big and small. They're looking for prices. Sometimes they hit a jackpot million dollar payout. Sometimes they get a 10K payout. Right.
And like our small a small attack or a big attack. But they're just looking to make an exploit. And so really every and that's why the number of data breaches are just rising exponentially every single year. Like if you look at the graph, it's terrifying and it's getting and it's getting cheaper and cheaper for them to do that because the techniques are getting more and more understood.
And like our small a small attack or a big attack. But they're just looking to make an exploit. And so really every and that's why the number of data breaches are just rising exponentially every single year. Like if you look at the graph, it's terrifying and it's getting and it's getting cheaper and cheaper for them to do that because the techniques are getting more and more understood.
The AI is getting better and better at doing this. So it's a really big growing problem. So everyone is vulnerable. It's not just if you're a startup, you're insulated because of your scale. Or if you're a large company, you're invulnerable because of your scale. Like Microsoft got hacked. Nvidia got hacked. Samsung got hacked.
The AI is getting better and better at doing this. So it's a really big growing problem. So everyone is vulnerable. It's not just if you're a startup, you're insulated because of your scale. Or if you're a large company, you're invulnerable because of your scale. Like Microsoft got hacked. Nvidia got hacked. Samsung got hacked.
Like these are really, really large companies that you'd think would have their stuff together. And still, they got hacked. So it's on all of us. All of us are responsible for keeping these credentials safe so we keep our users safe.
Like these are really, really large companies that you'd think would have their stuff together. And still, they got hacked. So it's on all of us. All of us are responsible for keeping these credentials safe so we keep our users safe.
Agreed. Like when you're in a firefight, you shouldn't be strategizing how to fight the firefight. You should just be doing the strategizing. Should it happen before the firefight? Right. You just want to be in execution mode when that happens. You want the execution mode to be as quick as possible. Like you should click a button and it should be done 30 seconds later. And that's it.
Agreed. Like when you're in a firefight, you shouldn't be strategizing how to fight the firefight. You should just be doing the strategizing. Should it happen before the firefight? Right. You just want to be in execution mode when that happens. You want the execution mode to be as quick as possible. Like you should click a button and it should be done 30 seconds later. And that's it.
Oh, yeah. Like there's some interesting ones that I've heard of recently of like printers, like old printers that are connected to Wi-Fi getting exploited or like everyone has all these IOT devices in their home that are connected to like the home hub system for Apple or Alexa or whatever. And those are internet connected too.
Oh, yeah. Like there's some interesting ones that I've heard of recently of like printers, like old printers that are connected to Wi-Fi getting exploited or like everyone has all these IOT devices in their home that are connected to like the home hub system for Apple or Alexa or whatever. And those are internet connected too.
So like a very small device can then basically get access to the wifi network, which then gets access to every device on that network. And thus the attack starts. So there's a lot of exploits outside that don't have to start with just your computer or just AWS.
So like a very small device can then basically get access to the wifi network, which then gets access to every device on that network. And thus the attack starts. So there's a lot of exploits outside that don't have to start with just your computer or just AWS.