Workflow
Incident Response
icon
Search documents
Cybersecurity. Come spopravvivere alle tempeste | Nicolas Fasolo | TEDxLakeComo
TEDx Talks· 2025-12-10 16:02
Cyber Security Threats & Trends - Cyber attacks are evolving from individual hackers to organized criminal groups with economic, political, or ideological motivations [4][5] - Artificial intelligence (AI) is being used by attackers to automate attacks, reduce the time to compromise a system (potentially from 10 days to a few hours), and lower the cost of entry by providing access to expertise and malware creation capabilities [19][20][21] - Attackers are shifting from technical exploits to social engineering, including voice clone attacks that can replicate the voice of a CEO or IT leader to gain unauthorized access or credentials [21][22] - Disinformation campaigns using AI-generated video, audio, and images are expected to increase, requiring users to verify information from trusted sources [26] Incident Response & Recovery - Incident response teams focus on transforming catastrophic events into learning opportunities to improve skills, collaboration, and knowledge within an organization [9] - A real-world example highlights a company with billion-dollar revenue that was completely encrypted, with all backups lost, leaving them at the mercy of the attacker [10][11][12] - In the aforementioned case, a partially compromised production file allowed the incident response team to develop code to reconstruct the file and restore production, preventing further losses [13][14][15] - Even with production restored, the company was still severely impacted, with technical departments lacking files, payroll unable to function, and customer/supplier trust damaged [17][18] Mitigation & Future Strategies - Companies should invest in training and education to promote the correct use of digital tools and data management [27] - Developing critical thinking skills is essential to avoid over-reliance on technology and pre-packaged responses [23][24] - Organizations need to evolve, develop critical thinking, and preserve human skills to navigate the digital landscape effectively [29]
Cybersecurity. Come spopravvivere alle tempeste. | Nicolas Fasolo | TEDxLakeComo
TEDx Talks· 2025-12-09 17:28
Cyber Security Threats & Trends - The digital world faces "storms" of dormant malware, hidden backdoors, and evolving phishing campaigns [2] - Cyber attackers operate silently, gathering credentials and exfiltrating information, waiting for the opportune moment to strike [4] - Cyber attacks have evolved from individual hobbyists to organized criminal groups with economic, political, or ideological motives [5] - Artificial intelligence (AI) is being used by attackers to automate attacks more efficiently, reducing compromise time by a factor of ten [19][20] - AI also lowers the barrier to entry for attackers by providing access to expertise and malware creation capabilities, reducing the need for external purchases [20][21] - Attackers are shifting focus to social engineering, using voice cloning technology to impersonate authority figures and trick users into divulging sensitive information [21][22] Incident Response & Recovery - Incident response involves transforming catastrophic events into learning opportunities to foster competence, synergy, and knowledge within an organization [9] - In a real-world case, a company with multi-billion dollar revenue experienced a complete infrastructure shutdown due to encryption [10] - The company had approximately 30 locations worldwide, half of which were production sites, leading to widespread disruption [11] - A compromised production file was partially recovered, allowing for the creation of code to restore production across the company's infrastructure [13][14][15] - Even with production restored, the company was still considered a "survivor" due to the extensive damage to other departments and compromised trust with clients and suppliers [16][17][18] Recommendations & Future Considerations - Individuals should be wary of unverified information sources online due to the potential for disinformation campaigns using manipulated video, audio, and images [26] - It is crucial to educate oneself on the proper use of digital tools and to manage personal and others' data carefully [27] - Individuals should develop critical thinking skills and avoid relying solely on AI-generated responses [29]
Datadog Launches Bits AI SRE Agent to Resolve Incidents Faster
Newsfile· 2025-12-02 17:00
Core Insights - Datadog has launched Bits AI SRE, an AI agent designed to autonomously investigate alerts and provide rapid remediation paths, significantly improving incident response times for organizations [1][5][6] Company Overview - Datadog is a monitoring and security platform for cloud applications, integrating various capabilities to provide real-time observability and security across technology stacks [7] Product Features - Bits AI SRE operates 24/7, analyzing telemetry and runbooks to identify root causes of alerts within minutes, thus allowing engineers to focus on building resilient systems rather than managing incidents [1][3][4] - The agent supports enterprise-scale operations, including HIPAA-regulated workloads, and features role-based access controls (RBAC) to ensure secure AI adoption [4] Market Impact - The launch of Bits AI SRE is seen as a significant expansion of Datadog's AI strategy, having been tested in over 2,000 customer environments, yielding positive outcomes in incident management [5][6] - Early adopters, such as Uber Freight, report improved clarity and reduced cognitive load during incidents, highlighting the agent's effectiveness in surfacing relevant information quickly [5][6]