Page 35 - Cyber Defense eMagazine June 2024
P. 35

Figure 1: NodeZero Platform



            RAD Security: Revolutionizing Cloud Security with Proactive Approach

            In a conversation with Brooke Motta, the CEO and Co-Founder of RAD Security, we delved into how
            RAD  Security  is  transforming  cloud  breach  detection  and  response.  As  a  behavioral  cloud-native
            detection and response company, RAD Security provides the ultimate source of truth for cloud breaches
            by behavioral fingerprinting i.e. proactively fingerprinting unique environments, enabling the detection
            of novel attacks in real-time.

            Traditional approaches to cloud security often rely on identifying millions of potential attack signatures,
            which is both time-consuming and inefficient. RAD Security takes a different approach by observing
            known good behavior and flagging any deviations as suspicious. For instance, fingerprinting sshd with
            RAD would have detected the XZ Backdoor attack immediately.

            RAD Security provides a comprehensive three-in-one solution (Figure 2), focusing on the critical areas
            targeted by attackers today: cloud native infrastructure, identity, and the software supply chain. This
            holistic approach enables organizations to embed runtime fingerprints into their supply chain pipelines,
            detect novel attacks during runtime, identify malicious insiders, and strengthen their shift-left security
            programs.  As  Brooke  Motta  emphasized,  securing  cloud  native  environments  has  become  the  most
            critical task for CISOs, as these environments underpin the massive developments in artificial intelligence
            (AI).  To  secure  AI,  it  is  imperative  to  secure  the  underlying  cloud  native  environments,  including
            containers and Kubernetes. The statistics are compelling: 70% of teams are currently using containers







            Cyber Defense eMagazine – June 2024 Edition                                                                                                                                                                                                          35
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   30   31   32   33   34   35   36   37   38   39   40