Anna Belak(@aabelak) 's Twitter Profileg
Anna Belak

@aabelak

Cloud and container security deep thoughts @sysdig. Gamer, PhD physicist, cat lady, ex-Gartner analyst. Opinions my own.

ID:113093273

linkhttps://www.linkedin.com/in/aabelak calendar_today10-02-2010 17:43:18

473 Tweets

626 Followers

719 Following

Anna Belak(@aabelak) 's Twitter Profile Photo

My people, my people, and my security people, come hang out with me and Forrester's delightful hackerxbella | Allie Mellen next week. We'll talk about handling threat detection at cloud speed, and we promise to be at least mildly entertaining!
bit.ly/3UgI6vU

account_circle
Sysdig(@sysdig) 's Twitter Profile Photo

🔥 Sysdig’s Anna Belak joined Screaming in the Cloud to discuss findings from our 2023 Global Cloud Threat Report. Hear her take on the challenges teams face in ensuring their cloud is secure, such as quantity of data vs. quality, automation & more. ⤵
okt.to/CqoEzW

account_circle
Last Week in AWS(@LastWeekinAWS) 's Twitter Profile Photo

'It’s really hard to know all the 51 ways to run containers in the cloud and then to be like, oh, 51 ways to run malicious containers in the cloud. How do I prevent all of them, when you have a day job?” — Anna Belak (Anna Belak)

Have a listen: buff.ly/45bB8KO

'It’s really hard to know all the 51 ways to run containers in the cloud and then to be like, oh, 51 ways to run malicious containers in the cloud. How do I prevent all of them, when you have a day job?” — Anna Belak (@aabelak) Have a listen: buff.ly/45bB8KO
account_circle
Sysdig(@sysdig) 's Twitter Profile Photo

Exciting podcast alert! 📣
🎙 Sysdig's Anna Belak sat down with Banyan Security's @denjonescyber to discuss the challenges tech-forward companies face. From zero trust strategies to reducing risk—this podcast covers it all!
🎧 Tune in:okt.to/X0UMeH

account_circle
Gartner(@Gartner_inc) 's Twitter Profile Photo

Live from , Gartner Opening Keynote: Debunking the Myths that Obscure Cybersecurity's Full Value. Gartner analysts practical steps leaders must take. Unlock another expert-led session now: gtnr.it/3qfZsMb twitter.com/i/broadcasts/1…

account_circle
Sysdig(@sysdig) 's Twitter Profile Photo

🗣 Hot @Gartner Summit Session alert! 🔥 Join former Gartner analysts Anna Belak & Michael Isbitski this Monday to learn about the anatomy of container attacks & mitigation strategies. Visit expo booth #931 & get ready for a Big Announcement™ 📢 from the Summit on Wednesday!

🗣 Hot @Gartner Summit Session alert! 🔥 Join former Gartner analysts @aabelak & @michaelisbitski this Monday to learn about the anatomy of container attacks & mitigation strategies. Visit expo booth #931 & get ready for a Big Announcement™ 📢 from the Summit on Wednesday!
account_circle
Dr. Anton Chuvakin(@anton_chuvakin) 's Twitter Profile Photo

My first post-analyst and I actually have time to watch the keynote ... and with Anna Belak ... that should make it even better :-) Let the fun and yet slightly cynical commentary commence!

account_circle
Sysdig(@sysdig) 's Twitter Profile Photo

is on the rise as threat actors exploit cloud resources for profit — resulting in significant financial losses for businesses. 💸 Learn about their tactics, costs & steps to protect your business in Anna Belak’s article for @StackPublishing: okt.to/ITCkLJ”

account_circle
Matt Johansen(@mattjay) 's Twitter Profile Photo

What are some good public breaches where we know Initial Access was a Kubernetes attack?

Or where kube played a role in the breach?

account_circle
Alex Delamotte(@spiderspiders_) 's Twitter Profile Photo

Matt Johansen Great question! SCARLETEEL is the best recent example that I know of. Actor exploited a vulnerable Kubernetes container and pivoted to the underlying cloud service account. sysdig.com/blog/cloud-bre…

account_circle
Sysdig(@sysdig) 's Twitter Profile Photo

Insightful takes from Anna Belak on how securing custom-built software has changed in recent years & why vulnerability prioritization is key to saving time & energy without slowing down the delivery of the organization’s business value. Check it out:
okt.to/DpLWN0

account_circle
CloudSecurityPodcast(@CloudSecPodcast) 's Twitter Profile Photo

Episode 94 'Meet Cloud Security Acronyms with Anna Belak' of Cloud Security Podcast where hosts Dr. Anton Chuvakin and Timothy Peacock interview Anna Belak (@aabelak) from Sysdig about cloud security acronym proliferation: CSPM, CWPP, CNAPP, etc
cloud.withgoogle.com/cloudsecurity/…

Episode 94 'Meet Cloud Security Acronyms with Anna Belak' of Cloud Security Podcast where hosts @anton_chuvakin and @_TimPeacock interview Anna Belak (@aabelak) from @sysdig about cloud security acronym proliferation: CSPM, CWPP, CNAPP, etc cloud.withgoogle.com/cloudsecurity/…
account_circle
Sysdig(@sysdig) 's Twitter Profile Photo

Are you willing to pay $430K for a stranger’s cryptocoins? 💸
Last chance to register for InformationWeek (10/6) & hear Anna Belak present the latest intel from Sysdig’s Threat Research Team on how attackers have evolved their strategies to reach the cloud. okt.to/BYILnU

account_circle
Sysdig(@sysdig) 's Twitter Profile Photo

Sysdig's Anna Belak & Wᴮoͬlͤmͭaͭrans are teaming up with AWS Partner Network for a webinar on 9/15 to discuss fundamentals & best practices for finding suspicious events with CloudTrail.

Reserve your spot in this complementary Techstrong Group webinar: okt.to/xhCZSK

Sysdig's @aabelak & @bwolmarans are teaming up with @AWS_Partners for a webinar on 9/15 to discuss fundamentals & best practices for finding suspicious events with #AWS CloudTrail. Reserve your spot in this complementary @TechstrongGroup #DevOps webinar: okt.to/xhCZSK
account_circle
Weld Pond | Chris Wysopal(@WeldPond) 's Twitter Profile Photo

A challenge I hear in software security is the tree vs the forest problem. It's one thing to work with one dev team to improve their secure dev process & have them meet a policy before pushing to prod. It's another thing to manage the security of a fleet of apps across an org.

account_circle
Sysdig(@sysdig) 's Twitter Profile Photo

A system that uses (ML) to detect sounds great—in theory, but as Anna Belak states in her latest article on @darkreading: ML is not magic pixie dust! ML should 𝙚𝙭𝙩𝙚𝙣𝙙 existing security methods, not replace them. okt.to/S8b5y9

account_circle