What is a hunt, and how does it scale across tens of thousands
How does GRR "hide" from malware?
How does GRR keep some of the great power it has from being
Automating and integrating GRR with external sources and
Features, functions, capabilities and some magic from Greg
The future features, requests, and direction of GRR
Greg Castle- Greg has 10 years
experience working in computer security. In his current role as
Senior Security Engineer at Google, he is a developer and user of
the open-source GRR live-forensics system. He also has strong
interest and involvement in OS X security, having been responsible
for the security of Google's OS X fleet for two years. His
pre-Google job roles have included pentester, incident responder,
and forensic analyst.
Security. Some assembly required.
Security is HARD, and 'real security' is a compromise between usability and security while knowing you're still accepting risk.
This podcast alternates between interesting interviews and news analysis every other week - tune in, subscribe and join the conversation on REAL security issues relevant to your enterprise.
Read the blog > http://hp.com/go/white-rabbit
Follow along on Twitter > http://twitter.com/wh1t3rabbit