Listen "Logging Governance and Sensitive Data"
Episode Synopsis
Pranay Kamat (Prod Mgmt @datadoghq) talks about the challenges is protecting sensitive data, internal vs. external attacks, evolution of DLP, the role of Governance in DevSecOps. SHOW: 617CLOUD NEWS OF THE WEEK - http://bit.ly/cloudcast-cnotwCHECK OUT OUR NEW PODCAST - "CLOUDCAST BASICS"SHOW SPONSORS:Revelo: Sidestep the competitive US talent market by hiring remote engineers in Latin America. Source, hire, and pay Latin American engineers in US time zones with one service. Revelo manages all the paperwork including benefits, payroll, and compliance. Hire a full-time engineer with a 14-day trial. Revelo.com/cloudcastMonitor CI Pipelines and Tests with Datadog CI VisibilityDatadog CI Visibility supports shift-left testing Identify and resolve front-end issues on your web applications before your customers notice. Start a free trial today.strongDM - Secure infrastructure access for the modern stack. Manage access to any server, database, or Kubernetes instance in minutes. Fully auditable, replayable, secure, and drag-and-drop easy. Try it free for 14 days - www.strongdm.com/signupSHOW NOTES:Datadog Sensitive Data ScannerBest practices for reducing sensitive data blindspots and riskBuilding a Modern Compliance Strategy [video]Topic 1 - Welcome to the show. Let’s talk about your background and the areas where you focus at Datadog. Topic 2 - We continuing to see headlines about critical data being stolen, which is a trend that doesn’t seem to be slowing down. Give us a picture of where we are with the problems that are still causing this, and what new things companies can do to prevent it.Topic 3 - Where are some of the differences between traditional Data Loss Prevent (DLP) strategies and strategies that proactively look at logs to identify data access and breaches? Topic 4 - We often think about attacks coming from the outside, but oftentimes attacks happen from inside the house (directly or indirectly). How important is it to be able to control access to logs and what is visible within logs to prevent internal attacks and vulnerabilities? Topic 5 - What are some of the more dynamic, modern ways to identify sensitive traffic and tag it properly so systems can act on it? Topic 6 - It’s often said that security is everyone’s issue. In modern teams (DevOps, DevSecOps, etc.), where are you seeing as the owner of this Governance and Sensitive data?
More episodes of the podcast The Cloudcast
It's the beginning of Cloud 2.0
18/01/2026
RAG That Survives Production
14/01/2026
20 Years of OSS Databases
07/01/2026
AI & Cloud Trends for December 2025
04/01/2026
Cloud and AI Predictions for 2026
31/12/2025
The Craziest Year (so far) comes to a close
28/12/2025
The 2025 State of AI in Review
24/12/2025
How AGI will change Everything, Everywhere
21/12/2025
The 2025 State of Cloud in Review
17/12/2025
Will there be a market for expert AI agents?
14/12/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.