Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing

Brian Vallelunga

👤 Person
280 total appearances

Appearances Over Time

Podcast Appearances

Ruby Rogues
Secrets Management Best Practices and Tools - RUBY 655

Um, and it was from what I, what we heard, it was quite a bit of a battle between the hackers and like, just because you wrote the key. Well, if they use that key to grant, to create new keys, now you're like, you have this cat and mouse game. Right. Um, and so it was quite a big challenge for them.

Ruby Rogues
Secrets Management Best Practices and Tools - RUBY 655

Um, and it was from what I, what we heard, it was quite a bit of a battle between the hackers and like, just because you wrote the key. Well, if they use that key to grant, to create new keys, now you're like, you have this cat and mouse game. Right. Um, and so it was quite a big challenge for them.

Ruby Rogues
Secrets Management Best Practices and Tools - RUBY 655

Uh, post Doppler, they, uh, have a secret station set up a whole level of orchestration with their infrastructure. And that same thing would have taken about like 30 seconds to a minute. They'd clicked a button and it'd been done. But, yeah, it was quite painful for them. And you can imagine all the users that were deeply impacted by that along the way. It's not fun.

Ruby Rogues
Secrets Management Best Practices and Tools - RUBY 655

Uh, post Doppler, they, uh, have a secret station set up a whole level of orchestration with their infrastructure. And that same thing would have taken about like 30 seconds to a minute. They'd clicked a button and it'd been done. But, yeah, it was quite painful for them. And you can imagine all the users that were deeply impacted by that along the way. It's not fun.

Ruby Rogues
Secrets Management Best Practices and Tools - RUBY 655

I think that the surprising thing is like that I hear a lot is, oh, this won't happen to me because my company is really big and we had the best security team. Or I also hear the quite another inverse, which happens all the time of like, I'm a small startup. Hackers won't care about my company. Right.

Ruby Rogues
Secrets Management Best Practices and Tools - RUBY 655

I think that the surprising thing is like that I hear a lot is, oh, this won't happen to me because my company is really big and we had the best security team. Or I also hear the quite another inverse, which happens all the time of like, I'm a small startup. Hackers won't care about my company. Right.

Ruby Rogues
Secrets Management Best Practices and Tools - RUBY 655

And like you hear this from both from the opposite sides, like the stars are saying one thing that the big companies are saying the other. And the truth is hackers are just looking for any company that they can exploit. Does not matter big and small. They're looking for prices. Sometimes they hit a jackpot million dollar payout. Sometimes they get a 10K payout. Right.

Ruby Rogues
Secrets Management Best Practices and Tools - RUBY 655

And like you hear this from both from the opposite sides, like the stars are saying one thing that the big companies are saying the other. And the truth is hackers are just looking for any company that they can exploit. Does not matter big and small. They're looking for prices. Sometimes they hit a jackpot million dollar payout. Sometimes they get a 10K payout. Right.

Ruby Rogues
Secrets Management Best Practices and Tools - RUBY 655

And like our small a small attack or a big attack. But they're just looking to make an exploit. And so really every and that's why the number of data breaches are just rising exponentially every single year. Like if you look at the graph, it's terrifying and it's getting and it's getting cheaper and cheaper for them to do that because the techniques are getting more and more understood.

Ruby Rogues
Secrets Management Best Practices and Tools - RUBY 655

And like our small a small attack or a big attack. But they're just looking to make an exploit. And so really every and that's why the number of data breaches are just rising exponentially every single year. Like if you look at the graph, it's terrifying and it's getting and it's getting cheaper and cheaper for them to do that because the techniques are getting more and more understood.

Ruby Rogues
Secrets Management Best Practices and Tools - RUBY 655

The AI is getting better and better at doing this. So it's a really big growing problem. So everyone is vulnerable. It's not just if you're a startup, you're insulated because of your scale. Or if you're a large company, you're invulnerable because of your scale. Like Microsoft got hacked. Nvidia got hacked. Samsung got hacked.

Ruby Rogues
Secrets Management Best Practices and Tools - RUBY 655

The AI is getting better and better at doing this. So it's a really big growing problem. So everyone is vulnerable. It's not just if you're a startup, you're insulated because of your scale. Or if you're a large company, you're invulnerable because of your scale. Like Microsoft got hacked. Nvidia got hacked. Samsung got hacked.

Ruby Rogues
Secrets Management Best Practices and Tools - RUBY 655

Like these are really, really large companies that you'd think would have their stuff together. And still, they got hacked. So it's on all of us. All of us are responsible for keeping these credentials safe so we keep our users safe.

Ruby Rogues
Secrets Management Best Practices and Tools - RUBY 655

Like these are really, really large companies that you'd think would have their stuff together. And still, they got hacked. So it's on all of us. All of us are responsible for keeping these credentials safe so we keep our users safe.

Ruby Rogues
Secrets Management Best Practices and Tools - RUBY 655

Agreed. Like when you're in a firefight, you shouldn't be strategizing how to fight the firefight. You should just be doing the strategizing. Should it happen before the firefight? Right. You just want to be in execution mode when that happens. You want the execution mode to be as quick as possible. Like you should click a button and it should be done 30 seconds later. And that's it.

Ruby Rogues
Secrets Management Best Practices and Tools - RUBY 655

Agreed. Like when you're in a firefight, you shouldn't be strategizing how to fight the firefight. You should just be doing the strategizing. Should it happen before the firefight? Right. You just want to be in execution mode when that happens. You want the execution mode to be as quick as possible. Like you should click a button and it should be done 30 seconds later. And that's it.

Ruby Rogues
Secrets Management Best Practices and Tools - RUBY 655

Oh, yeah. Like there's some interesting ones that I've heard of recently of like printers, like old printers that are connected to Wi-Fi getting exploited or like everyone has all these IOT devices in their home that are connected to like the home hub system for Apple or Alexa or whatever. And those are internet connected too.

Ruby Rogues
Secrets Management Best Practices and Tools - RUBY 655

Oh, yeah. Like there's some interesting ones that I've heard of recently of like printers, like old printers that are connected to Wi-Fi getting exploited or like everyone has all these IOT devices in their home that are connected to like the home hub system for Apple or Alexa or whatever. And those are internet connected too.

Ruby Rogues
Secrets Management Best Practices and Tools - RUBY 655

So like a very small device can then basically get access to the wifi network, which then gets access to every device on that network. And thus the attack starts. So there's a lot of exploits outside that don't have to start with just your computer or just AWS.

Ruby Rogues
Secrets Management Best Practices and Tools - RUBY 655

So like a very small device can then basically get access to the wifi network, which then gets access to every device on that network. And thus the attack starts. So there's a lot of exploits outside that don't have to start with just your computer or just AWS.