Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Technology
History
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/4e/5b/37/4e5b3721-f04b-a478-f229-a7503f51d81d/mza_11431422202120941292.png/600x600bb.jpg
DevSecOops
Cordant
11 episodes
2 months ago
Welcome to DevSecOops - a mostly serious podcast about modern ICT, and pragmatic solutions to complex problems.
Show more...
Technology
News,
Tech News
RSS
All content for DevSecOops is the property of Cordant and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Welcome to DevSecOops - a mostly serious podcast about modern ICT, and pragmatic solutions to complex problems.
Show more...
Technology
News,
Tech News
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/4e/5b/37/4e5b3721-f04b-a478-f229-a7503f51d81d/mza_11431422202120941292.png/600x600bb.jpg
Episode 9 - Rapid Fire Judgement
DevSecOops
1 hour 3 minutes 47 seconds
4 months ago
Episode 9 - Rapid Fire Judgement
In this episode, Tom and Scotti take listeners behind the curtain at Cordant, revealing how the team collaboratively approaches designing IT solutions—from infrastructure to cybersecurity. Framed around a hypothetical greenfield deployment, the discussion is a rapid-fire breakdown of their go-to tools, platforms, and philosophies—covering everything from hypervisors and SIEM solutions to code repositories and discovery tools. Key Topics Covered: Discovery & Strategy Process: The Cordant methodology: discovery, internal collaboration, and experience-based solution building. VMware & Broadcom Fallout: Tom discusses why VMware remains the on-prem hypervisor of choice, despite Broadcom's pricing and licensing challenges. Alternatives are weighed, including cloud-native VMs and infrastructure consolidation strategies. SIEM & Logging Solutions: Scotti explores cost-effective approaches to log management, weighing Splunk, Microsoft Sentinel, and CrowdStrike SIEM. He stresses the need to align tooling with organisational maturity and internal expertise, cautioning against over-investment in underutilised platforms. Code Repositories: The team debates GitHub, GitLab, Bitbucket, and cloud-native options. Security, ease-of-use, and deployment flexibility are discussed, especially in contexts requiring data sovereignty or air-gapped environments. Discovery Tooling & Attack Surface Management: With evolving threats shifting from network-focused to identity-centric attacks, Scotti outlines the importance of modern asset discovery tools like RunZero, AssetNote, and Wiz. He advocates for agentless, comprehensive visibility across hybrid environments. Key Takeaways: Vendor selection should reflect organisational context—not just feature sets. Tooling must match internal capability; gold-plated tech without operational maturity offers little value. Identity, not infrastructure, is the modern threat frontier—external and internal visibility is critical. Cloud-native and hybrid strategies should be evaluated tactically and strategically, not reactively.
DevSecOops
Welcome to DevSecOops - a mostly serious podcast about modern ICT, and pragmatic solutions to complex problems.