Sign in to view Lars’ full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Lars’ full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
San Francisco, California, United States
Sign in to view Lars’ full profile
Lars can introduce you to 10+ people at Datadog
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
10K followers
500+ connections
Sign in to view Lars’ full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Lars
Lars can introduce you to 10+ people at Datadog
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Lars
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Lars’ full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
About
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Articles by Lars
-
What is CSPM?
What is CSPM?
Cloud Security Posture Management (CSPM) safeguards cloud infrastructure by tracking configurations, ensuring…
21
1 Comment -
What Is Cloud Asset Inventory?Aug 5, 2022
What Is Cloud Asset Inventory?
On March 14, 2006, Amazon Web Services (AWS) launched S3, the first public cloud service. Since then, cloud consumption…
37
3 Comments -
Picking An Open Source License - A FrameworkNov 8, 2021
Picking An Open Source License - A Framework
In this post, I'm describing our decision making process to determine which license to pick for Resoto, our open source…
37
7 Comments -
The Shift to Multi-Cloud Is in Full SwingOct 12, 2021
The Shift to Multi-Cloud Is in Full Swing
On August 26 in 2006, Amazon Web Services put a computer into the cloud. That day, AWS launched EC2, a “virtual…
44
21 Comments -
Watch out Salesforce: Twilio, Segment and the $100B Battle for the Customer Engagement PlatformOct 19, 2020
Watch out Salesforce: Twilio, Segment and the $100B Battle for the Customer Engagement Platform
Today, Twilio announced how they are acquiring Segment for $3.2B, to "tear down data silos, helping companies and their…
78
3 Comments -
Apple Watch vs. Google Glass: 5 Reasons Why Apple Watch WinsApr 15, 2015
Apple Watch vs. Google Glass: 5 Reasons Why Apple Watch Wins
There are a lot of opinions floating around as to if the Apple Watch will succeed or disappoint. The last wearable…
3
2 Comments -
Apple’s iOS Release Cycle Accelerating for Apple Watch LaunchApr 9, 2015
Apple’s iOS Release Cycle Accelerating for Apple Watch Launch
For years, Apple’s releases have had “predictability” as their middle name. Chart the history of iOS and iPhone…
22
1 Comment
Activity
10K followers
-
Lars Kamp posted thisWith AI, as a startup, seems like you’re truly only growing if you have to measure your metrics with a log scale.
-
Lars Kamp shared thisAmong my favorite platform features are Datadog Sheets. Sheets are an easy-button to centralize, filter and analyze data and create reports - such as for your compliance audits, aka "Governance, Risk and Compliance" (GRC). Compliance today still deals with "snapshots." You pull data from your cloud provider, a separate vulnerability scanner, and a manual task tracker, then try to stitch them together in a (static) report. But by the time an auditor sees the data, it's already stale and the "unified view" is a collection of disconnected screenshots. There are GRC tools out there that have made that process much easier and elegant of course, in particular by combining data collection and reporting in a way that it's familiar to the auditors. That compresses the time and cost to perform an audit, a huge value. But you're still moving your security data to a separate compliance black box that lives outside of your actual environment, instead of bringing the reporting to where the data already lives. Think of Sheets as a spreadsheet interface that is built directly into your observability & security platform. That has a number of advantages for your GRC process: REAL TIME CORRELATION Instead of looking at a "sync" from four hours ago, you're querying and joining live data (SAST, SCA, misconfigurations, IAM risks, etc.) in one grid. FUNCTIONS & TRACEABILITY Since you're spreadsheet interface is connected to the full infra data, functions like lookups can trace a vulnerability from a line of code to a specific production host in seconds. REUSABLE LOGIC One of the drags of compliance work is doing the same work over and over again. With Sheets, once you've built an audit-ready template (e.g. filter by severity, status, environment), just refresh it for the quarter or month. Done! And I know what you're going to ask next - "in a world of AI, why would I still need a spreadsheet?" The reason is "trust", and auditor will want to see the formula, and not just a "black box" answer. An auditor will want to see the logic of how data point A led to conclusion B. Sheets organizes raw, messy security findings into a queryable, tabular format. The reports are business assets that you create for auditors. That's where AI comes in next. By putting your compliance data in a Sheet, you’ve now created a clean room for AI to synthesize your findings. With your compliance reports in Sheets, you can use natural language to ask Bits AI, our built-in AI Assistant, to e.g. "summarize the high-severity vulnerabilities in this view". Bits AI makes it much easier to find patterns that a human might miss or take lots of time to identify. My colleagues Reva Ranka and Gorka Vicente wrote more about how you can use Sheets to generate audit-ready vulnerability and compliance reports: https://lnkd.in/gASYzzkP
-
Lars Kamp shared thisI just found out about Cooking with CISOs by Dani Woolf, and it's plain out amazing. https://lnkd.in/g9SbXWemLars Kamp shared thisWhat does a 24-year partnership actually look like? In this episode of Cooking with CISOs, we're joined by Scott Shepard, VP Cybersecurity and IT Infrastructure at Motorola Solutions, and Erik Montcalm, VP of Client Services at SecureOps. Together with surprise guest, Loren Goldig, CEO of SecureOps, they make Canadian lobster poutine (with cheese curds smuggled across the border) and unpack a partnership that started 24 years ago! In this episode of Cooking with CISOs, we'll uncover: - How a 24-year partnership was born and why SecureOps became Motorola's "Marines" - The cupboard SOC, the 9/11 call, and the moment that defined the relationship - The innovation flywheel - how Motorola's challenges become SecureOps' capabilities - Scott's origin story - how a hacked lab turned a bored engineer into a 30-year security leader - What partnership looks like in the trenches - weekends, incidents, shared pain - AI agents attacking, AI agents defending and why you need a partner that evolves This is not a case study. It's not a testimonial. It's the story of what happens when challenge creates capability, capability creates trust, and trust creates legacy. Thick and thin. Join us to binge-watch the full episode, airing Friday, February 13th at 12pm Eastern/11am Central. A huge thank you to our friends at SecureOps for sponsoring this episode and for bringing Scott to the table. --- Cooking with CISOs is proudly brought you by the team at The CyberNest, CyberSynapse.io, and Whyze Labs.
-
Lars Kamp shared thisOn March 18th we're hosting "Sip & Secure", a virtual event that booked out in no time flat last year, and combines cloud security with wine tasting! It's a 90-min session where we take a high-level look at Datadog’s security platform, followed by a guided wine tasting experience with Stags' Leap Winery. Stag's Leap will ship 3 bottles of wine to your home, and one of their winemakers will join us live and walk you through the tasting experience for each wine. "Sip & Secure" started as a test last year, because we wanted to work with our customers who may not be in one of the metro areas where he host dinners. "What if we just shipped wine to people's homes?" we asked ourselves. Well, turns out that idea worked quite well! We had quite a few "oohs", "aahs" and "oh wow!' during the tasting session, and some attendees brought along their colleagues and spouses. It was quite an experience to see so many different people go through a wine tasting experience on Zoom, and so we decided to bring Sip & Secure back! So if you like wine and cloud security, we got something for you! You can sign up to join the experience with this link: https://lnkd.in/gXm5FMaqSip & Secure: From Threat Detection to Decanting with Datadog + ExpelSip & Secure: From Threat Detection to Decanting with Datadog + Expel
-
Lars Kamp shared thisI think AI is causing a shift in the security stack, from a “𝗿𝗶𝘀𝗸 𝘀𝘁𝗮𝗰𝗸” to a “𝗿𝗲𝘀𝗽𝗼𝗻𝘀𝗲 𝘀𝘁𝗮𝗰𝗸”, and it’s more than just “AI agents”. The traditional cybersecurity model is the “risk stack”, and security is a discipline of detection. We scan, alert, score, prioritize, and generate tickets. The stack is designed to tell humans what’s wrong. That model stops working when you have bad actor agents who can breach your infra in less than 20 minutes. In that new world, you have to find a way to respond to incidents and fix them autonomously, and that is the shift to a “response stack”. Security teams already have no shortage of alerts. The output of the "risk stack" is ultimately tickets (Jira, ServiceNow, Slack), and that creates a human bottleneck. Prioritization is a nicer way of saying that we only fix the most dangerous issues because we don’t have the time to fix everything. So the solution can’t be to just keep on adding to the backlog of unsolved problems. The math stops working when we keep operating defense at human-speed against a theoretically infinite number of actors and threats. The goal has to be that we substitute tickets with actions. That’s of course where AI comes in, with AI agents that perform the autonomous fixing. Technology aside, the “response stack” also requires a “from / to” shift in thinking: 𝗢𝗯𝗷𝗲𝗰𝘁𝗶𝘃𝗲: Prioritization (scoring risks) → response (fixing risks) 𝗘𝘅𝗽𝗲𝗿𝗶𝗲𝗻𝗰𝗲: Widgets ("check this graph") → agents ("I fixed it") 𝗪𝗼𝗿𝗸𝗳𝗹𝗼𝘄: Tickets (human queues) → PR (automated code) 𝗜𝗻𝘁𝗲𝗹𝗹𝗶𝗴𝗲𝗻𝗰𝗲: Signatures (static rules) → inference (reasoning models) 𝗘𝗰𝗼𝗻𝗼𝗺𝘆: Logs (cost of storage) → tokens (cost of action) To perform autonomous response and remediation, the AI agent needs, wait for it, context. Yes, I know, not an earth-shaking insight. But I think that need is making the case to unify two currently separate teams and data sets, observability and security. Today, these teams are looking at data on different screens, telling different stories, for different use cases. 𝗘𝗻𝗴𝗶𝗻𝗲𝗲𝗿𝗶𝗻𝗴 optimizes for performance with reliability data 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 optimizes for posture with risk data I think keeping observability and security data separate is risky in the age of AI. The separation keeps you in the old risk stack and prevents you from shifting to a response stack. AI agents need full context to respond to incidents, and essential metadata like metrics, traces, and ownership is hidden in engineering's observability data. Bringing data and teams together has more benefits. Engineering has a strong incident-response muscle from dealing with operational issues that can be repurposed for security incidents. Conversely, security's complete view of inventory and shadow IT/AI benefits engineering, to test for misuse, not just bugs, and build resilient agents that perform. Picture courtesy of Nano Banana.
-
Lars Kamp shared thisI've been thinking about the data ecosystem, and 2026 feels like the year of "The Great Convergence", with 3 trends. 👇 I don't remember who said it, but "there are two ways to make money, bundling and unbundling." Well, the era of "best-of-breed" fragmentation is over. After years of unbundling, the data ecosystem is consolidating. It’s no longer about stitching together 15 different tools (which is insanity to start with, but VCs need to write checks...). Now, it’s about choosing your platform. 3 dynamics shaping the industry: 1️⃣ 𝗠𝗼𝗱𝗲𝗿𝗻 𝗗𝗮𝘁𝗮 𝗦𝘁𝗮𝗰𝗸 𝗖𝗼𝗻𝘀𝗼𝗹𝗶𝗱𝗮𝘁𝗶𝗼𝗻 Fivetran is evolving from a connector utility to an "open data infrastructure" platform. Fivetran acquired dbt Labs (transformation), Census (activation), and Tobiko Data (governance/SQLMesh), and rolled up the "Modern Data Stack" into a single, unified lane. It's the consolidation of the infrastructure layer that sits between your raw data sources and your data warehouse (like Snowflake or Databricks). Adjacent categories like reverse ETL and data observability will be features, not standalone (and overcapitalized) companies. For example, Datadog acquired Metaplane to offer data observability as part of our platform. 2️⃣ 𝗖𝗹𝗮𝘀𝗵 𝗼𝗳 𝘁𝗵𝗲 𝗧𝗶𝘁𝗮𝗻𝘀: 𝗕𝗶-𝗗𝗶𝗿𝗲𝗰𝘁𝗶𝗼𝗻𝗮𝗹 𝗘𝘅𝗽𝗮𝗻𝘀𝗶𝗼𝗻 Snowflake and Databricks are conquering each other's territory. Snowflake (the "trust" play) is expanding "down the stack", e.g. with the acquisition of Datometry to accelerate legacy migrations, and "up the stack" into AI trust and metadata with Truera and Select Star. An attempt to build a governed, integrated ecosystem where apps live alongside data. Observe was a great outcome, but not a runaway success, and observability is new market/app for Snowflake. Databricks (the "warehouse" play) is validating the Lakehouse by moving "up the stack". Databricks SQL has $1B+ in revenue. With the acquisition of Tabular (creators of Iceberg) they are commoditizing the data format, and have proven that a unified platform for BI + AI is possible. Databricks is already the data acquisition layer - easier to convince customers to also use them as the analytics layer. The other way around - not so much. Snowflake relies on Fivetran. 3️⃣ 𝗧𝗵𝗲 𝗘𝗺𝗲𝗿𝗴𝗲𝗻𝗰𝗲 𝗼𝗳 𝘁𝗵𝗲 "𝗕𝘂𝗶𝗹𝗱𝗲𝗿'𝘀 𝗦𝘁𝗮𝗰𝗸" There's a new, agile ecosystem rising from the edge. Tools like DuckDB/Motherduck (in-process OLAP), dlthub (code-first ELT), and ClickHouse (real-time analytics) are forming a "Builder's Stack". This stack is about offloading local, real-time, and developer-heavy workloads to faster, cheaper, and simpler engines. They cater to a user base who prefer to use code over SQL to extract data from wide variety of sources - and that code just got easier to write with LLMs! The ZIRP-era fragmentation is def over and resolving into platforms. I don't know who is going to win, but there might be enough $$$ in the market for everyone.
-
Lars Kamp posted thisAt Datadog, we think about AI in three distinct buckets: 1. 𝗔𝗜 𝗳𝗼𝗿 𝗗𝗮𝘁𝗮𝗱𝗼𝗴: Building agents into our products. 2. 𝗗𝗮𝘁𝗮𝗱𝗼𝗴 𝗳𝗼𝗿 𝗔𝗜: Securing & monitoring our customers' AI workloads. 3. 𝗔𝗜 𝗮𝘁 𝗗𝗮𝘁𝗮𝗱𝗼𝗴: Using AI internally to ship faster OpenAI just published a case study on that third bucket. It details how our engineering team uses Codex to solve a specific challenge: maintaining velocity at Datadog scale. The sheer size of our systems exceeds what any single human can hold in their head. • We have thousands of engineers shipping code constantly. • We ingest trillions of data points hourly. • We support thousands of customers. Standard coding assistants help you write functions faster. But at our scale, we need more than syntax completion. We need system-level understanding. We integrated Codex into our internal workflows using MCP. This connects the AI model to our live observability data. The result is an agent that doesn't just "write code." It acts as an on-call partner that: • reviews logic against production constraints. • detects anomalies in telemetry during development. • suggests fixes based on incident history, not just training data. This closes the loop between 𝘸𝘳𝘪𝘵𝘪𝘯𝘨 𝘴𝘰𝘧𝘵𝘸𝘢𝘳𝘦 and 𝘳𝘶𝘯𝘯𝘪𝘯𝘨 𝘴𝘰𝘧𝘵𝘸𝘢𝘳𝘦. Here's the simple "so what?" from the post: Don't just use AI to generate boilerplate. Connect it to your runtime data. That is how you turn a coding tool into an engineering asset. At least, that's how we did it and it's working for us. Shoutout to our colleagues Brad Carter and Ted Wexler quoted in the post. Read the full deep dive from OpenAI here: https://lnkd.in/gp-d7RE4
-
Lars Kamp shared this“60% of the time, it works every time” [Anchorman] → How we prevent AI Slop in Datadog products. Story time: During the mobile SDK days, a developer at “Hotel Tonight” cross-correlated two data points in our analytics dashboard. You really had to dig in to find that data - but it means he was an engaged user. In fact, super-engaged. Those data points should have been identical. But they weren't, because we used two different data stores on the back-end. Why is a story for another day, but that customer lost complete faith in our product, and it took us a year (and re-architecting our stack) to fix the issue and gain that trust back. I see this problem again in AI products. By now, we can all sniff out AI-generated content from a mile away (“in this ever-evolving [insert industry] landscape”, etc.) And that's just not good enough for infrastructure and security, especially when you’re responding to a production or security incident. You need accuracy, not “60% of the time, it works every time.” If you don’t have accuracy - your customers will lose faith in your product. At Datadog we’re investing heavily into Bits AI, our suite of intelligent AI capabilities that work across your monitoring, development, and security workflows. Our Bits AI agents make recommendations and perform actions. So the quality bar for Bits AI is to build AI agents that act like a senior engineer on your team, someone you can rely on. That means we can't just rely on generic models, but need to set a "new normal" for accuracy. In practice that means no AI feature ships without evaluation against high-quality, expert-labeled datasets. Three ways how we accomplish that “new normal”: MODELS & DATA We of course use the frontier-LLMs (GPT, Claude, Gemini). But we’ve also built our own open-source foundation models and benchmarks (Toto and BOOM) to ground our AI in the reality of distributed systems. We have one of the world's largest, maybe even the largest observability data set, an ideal training ground. HUMAN IN THE LOOP Our Bits AI team has built evaluations using thousands of real alert root causes from our own internal production environment (this is the moment where no other company can make a better pun with "dogfooding"). That’s actual operational data that ends up paging people. With our evaluations, we ensure our agents are tested against real-world, not theoretical scenarios. SHARED INFRASTRUCTURE We’ve built a common infrastructure for data archiving, labeling, and reusing evaluation datasets. That gives our engineers readily available evaluation datasets, shortens our development cycles, and defines standards for our product teams to evaluate new AI features. So when Bits AI makes a recommendation, it has been measured against thousands of real-word data points, with the judgment of our human experts. Accuracy you can rely on. If you're at Reinvent this week, check out Bits AI - and I think you'll be delighted!
-
Lars Kamp shared thisIf you've been told by your CEO to "figure out our AI story", we've got something for you at Reinvent! 🛝 But before everything else you want to try out our Giant Slide at the entrance of the expo floor. 🥐 We also host breakfasts, lunches and cocktail hours all week long - come join us! --> use the link in the post to register! Other than that, we've got some ~40 new product releases to show you, of course with lots of new AI capabilities and features. So please take a moment for these important messages: 🔎 AI & AI OBSERVABILITY Agent Builder Conversational AI AI Agents Console Datadog MCP Server Prompt & Version Tracking Experiments & Playground Bits AI K8 Active Remediation Bits AI Serverless Remediation Bedrock & AWS Strands Agent Support ⛅ AWS & OBSERVABILITY Flex Frozen Cloud Prem Status Pages Packs for AWS Network Health Log Rehydration AWS Batch Metrics RDS Instance Recommendations Lambda Cost Recommendations CloudWatch Metrics for GovCloud 🚂 SECURITY Secret Scanning OCSF Processor AI Security Graph Cloud Risk Insights AI-based Code Detection AI-based Code Validation AI-based Code Remediation Amazon Bedrock Misconfigurations See you on the Expo Floor!Lars Kamp shared thisWhat an incredible start to #AWSreInvent! 🎥 Watch the highlights and see what’s coming next. 🔗 https://lnkd.in/ga-UDMUQ #reInventwithDatadog
-
Lars Kamp liked thisWith AI, as a startup, seems like you’re truly only growing if you have to measure your metrics with a log scale.
-
Lars Kamp liked thisLars Kamp liked thisDatadog is helping healthcare customers like Henry Meds stay secure without slowing down. With Datadog Cloud SIEM, their team moved from juggling multiple tools to centralized visibility and correlated, actionable signals — enabling faster, more effective incident response in a single streamlined workflow. Thank you to Stefan R. for the partnership and perspective.
-
Lars Kamp liked thisLars Kamp liked this28 years - a long journey by any stretch, and one that’s been extraordinary. After nearly three decades, I’m turning the page on the practice of law. It’s a journey that started with no expectations; but one that’s given me so much. Being bold enough to be different has allowed me to achieve everything I could have possibly imagined, and more. Practicing at the highest levels and, for the most part, on the side of amazing and irrepressible founders, operators and company builders (as well as the daring investors who backed them), has been the greatest honor of my life. 🌎 It’s taken me from NYC, to London, to SF and Silicon Valley. With MANY visits to other ecosystems in between! 🏛️ I’ve been entrusted as a key strategic advisor on more than 300 transactions valued at over $275 billion in aggregate deal value; some that have been groundbreaking in their structure. All of them have created impact for the wonderful humans involved, and that brings me joy. 💫 My privilege has been to learn from from some of the world’s best at Davis Polk & Wardwell LLP (my rigorous “classical training”). Through the luck of an intro, Wilson Sonsini Goodrich & Rosati extended me the opportunity to develop deep immersion and witness the power and impact of technology on every industry (my “strategic evolution”). Most importantly, I was called on to build with entrepreneurial partners at Goodwin to launch their West Coast Tech Practice. This attempt by an East Coast firm to not only break into, but eventually best, Silicon Valley incumbents was audacious! The agency and the collaborative spirit here allowed me to be an intrapreneur. That will always be the highlight of my legal career. 🚀 And what a rocketship! Being a part of - and ultimately entrusted to lead - a team what has been ranked the #1 M&A practice in the world for 6 straight years is one build that I’ll never forget. And the fact that in doing so garnered the recognition of my peers and clients both, I’m very proud of. I am happy that I’m not bidding goodbye to #goodwinlaw�� I have transitioned to a Senior Advisor role which will allow me to stay close to a place that will always feel like family to me. ❤️ Too many people to thank - so many who have made an impact on my trajectory, my thinking and my life - that I will simply say, THANK YOU, from the bottom of my heart… you know who you are! 🙏 Especially to my clients, who have entrusted their most crucial transactions to me, many of whom have become dear friends. So what’s next? I’m, of course, going to build something new! I can’t sit still and I don’t do beach vacations. Do share what you’re working or is fascinating you. And I’ll share more about what I’m working on in due time… BTW - those who know me know that l’m a big believer in fate, serendipity and… signs. 🪧 A couple below are ones that literally crossed my path recently. And yes, I’m 52. A great age for a new adventure. Amaze, Amaze, Amaze! #iykyk 🎤 #micdrop
-
Lars Kamp liked thisLars Kamp liked thisFounders: Create a 'Closing Week' checklist: - All stakeholders identified - Security reviews completed - Payment process confirmed - Implementation timeline agreed No surprises in the final yard.
-
Lars Kamp liked thisLars Kamp liked thisOnly 18% of vulnerabilities labeled “critical” remain critical once you factor in runtime context and exploitability signals. Vulnerability backlogs don’t grow because teams don’t care, they grow because there’s never enough time. When everything is critical, nothing truly is. Leaning on CVSS alone often doesn’t reflect the reality of how an application is actually running in production. At RSA, I’ll be digging into this in my session: Rethinking Vulnerability Backlogs: When CVSS Scores Don’t Match Reality Thursday March 26 @ 10:50 We’ll explore what changes when you evaluate severity through real application context, and how that shift can dramatically reshape priorities (and reduce noise). If you’ve ever stared at a backlog and wondered, “Are these really all urgent?” This session is for you. #RSAC
-
Lars Kamp liked thisLars Kamp liked thisDo you create or build things in California? The proposed "one time, billionaire tax" allows the state to take a slice of everything you own, it's not one time, it's not limited to billionaires and (even)the government accounts say it won't work.The California Government Wants Your Ass.etsThe California Government Wants Your Ass.etsChristopher Lochhead
Experience & Education
-
Datadog
******* ***********
-
*** *******
******* *****
View Lars’s full experience
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
View Lars’ full profile
-
See who you know in common
-
Get introduced
-
Contact Lars directly
Other similar profiles
Explore more posts
-
The Cyber Security Hub™
2M followers
Download Pentera Labs Report - revealing three new critical injection points in the ingress-nginx controller, building on Wiz’s IngressNightmare CVE. These overlooked vulnerabilities could let attackers hijack traffic, spoof headers, or reach unauthorized backend services - They exist in one of the most widely used ingress controllers in Kubernetes, putting countless environments at risk. This research highlights how small misconfigurations can lead to major exposure in modern cloud-native architectures. What’s Inside: ✅ 3 new injection vulnerabilities in ingress-nginx ✅ How attackers find and exploit CVEs in open source ✅ Actionable tips to secure your Kubernetes environment https://lnkd.in/eHtX6EdP
9
1 Comment -
The Cyber Security Hub™
2M followers
Download Pentera Labs Report - revealing three new critical injection points in the ingress-nginx controller, building on Wiz’s IngressNightmare CVE. These overlooked vulnerabilities could let attackers hijack traffic, spoof headers, or reach unauthorized backend services - They exist in one of the most widely used ingress controllers in Kubernetes, putting countless environments at risk. This research highlights how small misconfigurations can lead to major exposure in modern cloud-native architectures. What’s Inside: ✅ 3 new injection vulnerabilities in ingress-nginx ✅ How attackers find and exploit CVEs in open source ✅ Actionable tips to secure your Kubernetes environment https://lnkd.in/eHtX6EdP
6
1 Comment -
The Cyber Security Hub™
2M followers
Download Pentera Labs Report - revealing three new critical injection points in the ingress-nginx controller, building on Wiz’s IngressNightmare CVE. These overlooked vulnerabilities could let attackers hijack traffic, spoof headers, or reach unauthorized backend services - They exist in one of the most widely used ingress controllers in Kubernetes, putting countless environments at risk. This research highlights how small misconfigurations can lead to major exposure in modern cloud-native architectures. What’s Inside: ✅ 3 new injection vulnerabilities in ingress-nginx ✅ How attackers find and exploit CVEs in open source ✅ Actionable tips to secure your Kubernetes environment https://lnkd.in/eHtX6EdP
3
-
Cybrlytics Technology
10K followers
Download Pentera Labs Report - revealing three new critical injection points in the ingress-nginx controller, building on Wiz’s IngressNightmare CVE. These overlooked vulnerabilities could let attackers hijack traffic, spoof headers, or reach unauthorized backend services - They exist in one of the most widely used ingress controllers in Kubernetes, putting countless environments at risk. This research highlights how small misconfigurations can lead to major exposure in modern cloud-native architectures. What’s Inside: ✅ 3 new injection vulnerabilities in ingress-nginx ✅ How attackers find and exploit CVEs in open source ✅ Actionable tips to secure your Kubernetes environment https://lnkd.in/eHtX6EdP
2
-
Pentera
92K followers
Ron Okopnik from Pentera Labs built on Wiz’s IngressNightmare research and discovered three previously undocumented injection points in Kubernetes’ ingress-nginx controller. These vectors go beyond the original four CVEs and give attackers the ability to bypass security controls, execute arbitrary code, and pivot deeper into Kubernetes clusters. Security teams need to think like attackers. This research helps them do exactly that. 👉 𝗥𝗲𝗮𝗱 𝗺𝗼𝗿𝗲 𝗼𝗻 𝗵𝗼𝘄 𝘁𝗵𝗲𝘀𝗲 𝗿𝗶𝘀𝗸𝘀 𝘂𝗻𝗳𝗼𝗹𝗱 𝗮𝗻𝗱 𝘄𝗵𝗮𝘁 𝘁𝗵𝗲𝘆 𝗺𝗲𝗮𝗻 𝗳𝗼𝗿 𝗞𝘂𝗯𝗲𝗿𝗻𝗲𝘁𝗲𝘀 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆: https://lnkd.in/dra7Ai-4 #Kubernetes #PenteraLabs #CloudSecurity
44
-
Bill Marozas
Docker, Inc • 4K followers
Market-leading security means fixing the source, not just the symptom. When a critical RCE vulnerability (CVE-2025-12735) was discovered deep in a nested dependency affecting projects like Kibana, users of Docker Hardened Images received immediate protection. (Hat tip: Laurent Goderre!) Docker's investment and thought leadership go further: the Docker Security team didn't just patch our images. We traced the vulnerability, replaced the unmaintained library, and contributed the fix upstream to the LangChain.js project (PR #9391). This upstream approach strengthens the security of the entire ecosystem, protecting millions of downstream applications globally. That’s the proven value of using Docker Hardened Images—security designed to match the speed of modern supply chain attacks. Read more about our upstream approach: https://lnkd.in/gMH_ezkZ #Docker #ContainerSecurity #SupplyChainSecurity #HardenedImages #CVE #OpenSource
-
JFrog
88K followers
Stop switching tabs. Start shipping verified artifacts. JFrog is officially live on the Cursor Marketplace! You can now bring JFrog’s #SoftwareSupplyChain security directly into your AI-native IDE. Ask Cursor to check for vulnerabilities, and it will use JFrog's verified security data to analyze your code and recommend precise remediation. 🛠️ Install now: https://lnkd.in/gUZUP-2d #CursorAI #DevSecOps #AI
130
-
Daniel Young
Circadian Risk Inc. • 9K followers
Here’s a pattern I’m seeing more often: More sites. More assessments. More reporting expectations. Same headcount. Security teams are being asked to scale output without scaling structure. So what happens? Assessments become episodic. Reporting takes too long. Prioritization becomes subjective. And leaders spend more time translating risk than reducing it. This isn’t a capability issue. It’s an architecture issue. At some point, physical security has to operate with the same operational discipline as finance and IT. Otherwise it stays in permanent catch-up mode. For security people overseeing medium to large portfolios (20+ sites): What’s currently your biggest bottleneck volume, visibility, or validation? And why do you think this is?
4
-
Root
2K followers
Fixing vulnerabilities shouldn’t take your team hours—or days. Most teams spend 3+ hours per CVE. Multiply that across every container image, and you’re looking at days of lost productivity. Root was built to solve that. Root automates remediation with agentic AI, cutting CVE response time from hours to seconds. No disruption. No rebasing. No vendor lock-in. Security teams stop chasing CVEs. Developers stay in flow. Vulnerabilities get fixed before SLA deadlines are even close. Want to see how much time you could save? Read the full blog—link in comments.
5
1 Comment -
Michele Chubirka
Red Hat • 5K followers
California AG sues city for allowing out-of-state searches of license plate reader database https://ift.tt/kvT8Q7f Police in El Cajon, California, searched their Flock Safety database of license plate activity on behalf of multiple out-of-state entities — in violation of California law — according to Attorney General Rob Bonta. via The Record from Recorded Future News https://ift.tt/qIjGkVD October 03, 2025 at 03:30PM
-
Conrad Vernon
Resonance Dynamics, Inc. (RDI) • 883 followers
RDI Finalizes AWS‑Specific SRD/CRU Evaluation Protocol — Zero Hardware Modification Resonance Dynamics, Inc. has completed the AWS‑specific SRD/CRU evaluation protocol, engineered to evaluate SRD/CRU directly on AWS Braket’s superconducting backends and pulse‑level control stack. No hardware or firmware modification is required. Strategic alignment with AWS’s quantum roadmap: AWS Braket is entering regimes where coherence stability becomes an architectural bottleneck across multi‑vendor superconducting systems. SRD/CRU was built for this moment: a stability overlay that reinforces system behavior without altering AWS’s qubit modalities, resonator infrastructure, or pulse‑control workflows. What this enables for AWS’s executive technical leadership: • Zero integration risk: Fully compatible with AWS Braket’s superconducting QPUs and pulse‑level control API without modification. • Roadmap‑aligned evaluation: Runs inside AWS’s existing calibration, pulse‑optimization, and hybrid‑job infrastructure. • Deterministic stability metrics: Controlled measurement of SRD/CRU’s impact on coherence behavior, error‑rate profiles, and sub‑coherence‑mode dynamics. • Scalable relevance: Applicable as AWS expands Braket’s superconducting offerings and advances toward larger, higher‑fidelity systems. This is an architectural evaluation, not a feature test. Next step: RDI is prepared to brief AWS’s quantum leadership and research teams. The protocol is complete, architecture‑aligned, and ready for AWS’s internal evaluation pipeline. AWS continues to broaden the frontier of accessible quantum system engineering. SRD/CRU was built to reinforce that frontier—quietly, modularly, and without requiring AWS’s systems to change. Please contact Conrad Vernon President & CEO, Resonance Dynamics, Inc. #QuantumComputing #QuantumStability #QuantumArchitecture #AWS #AWSBraket #DeepTech #SystemEngineering #RDI #SRD #CRU
-
Rahul Sood
Pindrop • 6K followers
Harness new fiscal year starts this month. Harness CKO starts tomorrow. Celebrating it with the launch of industry's first and only pipeline native security scanning (SAST & SCA). Another major step towards Harness' promise of AI-powered DevSecOps. 👎 No to partial pipeline coverage for security scanning 👎 No to painful manual configuration of scanners 💪 Yes to prioritize reachable exploits 💪 Yes to shift left to AI coding IDEs and CLIs 💪 Yes to using AI for remediation If you are a Harness customer, try for 45 days for free. Very proud of our ability to integrate and extend Qwiet AI by Harness within a quarter. Congrats team Monish Advani Gabriel Acevedo Sunil Gupta Pritesh Chandaliya Renny Shen Samarth Sudarshan . Excited about shaping the future to AppSec with Naresh Agarwal Sanjay Nagaraj Jyoti Bansal!!
24
4 Comments -
Dhruv Majumdar
Fleet Device Management • 3K followers
🚀 Introducing Fleet Hound: Graph Security Analysis for Fleet I’m excited to open-source "Fleet Hound", a new high-performance tool designed to visualize and analyze relationships within your infrastructure using Fleet Device Management. Inspired by tools like BloodHound and Cartography, Fleet Hound takes a graph-first approach to inventory. Instead of viewing flat lists, it ingests Fleet data into Memgraph to map the hidden connections between your assets. 🔍 What it does: Visualization: Maps Hosts, Users, and Software as interactive graph nodes. Relationship Analysis: Automatically identifies links (e.g., (:User)-[:USES]->(:Host)). Granular Control: Supports filtering by specific Teams for targeted analysis. Performance: Built with parallel processing to handle thousands of assets in seconds. It’s fully Dockerized and ready to deploy. Check it out on GitHub: https://lnkd.in/gkNpaSTH #FleetDM #GraphDatabase #SecurityEngineering #DevSecOps #OpenSource
237
4 Comments -
Elina Cadouri
Dock Labs • 3K followers
A major topic at the European Identity and Cloud Conference this year was the emergence of non-human identity. While we’ve been exploring organizational wallets for some time, the focus at EIC was on securing infrastructure (servers, systems, and agents) with cryptographic credentials. New standards like SPIFFE and SPIRE, combined with OpenID-based authentication flows, are shaping how these machine identities will be handled securely and interoperably in the future. Another dominant theme was the rise of AI agents. There’s broad agreement across the industry that AI agents will soon become a core part of how individuals and businesses interact online, accelerating customer journeys, managing workflows, and even making autonomous decisions. From shopping assistants to financial bots that handle bill payments and optimize spending, these agents promise speed, convenience, and massive scalability. But in our view, realizing that potential depends on a critical foundation: trust. If these AI-powered systems are to operate safely and at scale, every interaction must reliably answer three essential questions: > Is this agent truly acting on behalf of a legitimate user or organization? Can we prove it? > Has the user authorized this specific action, under clearly defined terms? > And can the payment provider, merchant, or institution instantly verify that claim with full confidence? Without strong identity and delegation mechanisms, businesses face serious risks: fraud, impersonation, unauthorized spending, and compliance failures. A malicious actor could spoof an agent, hijack its permissions, or manipulate a system into executing unauthorized actions. While the technical conversations at EIC were focused on how to authenticate and authorize agents, we found that the legal and business risks, especially around liability, received far less attention. Frameworks will need to emerge that clearly define who’s accountable when something goes wrong.
22
5 Comments -
Dimitris Adamidis
Dusty Robotics • 13K followers
🚨 Your security team checks your locks once. Then 2,700 strangers walk through your house over the next 90 days. ‼️ That's exactly what's happening to your codebase right now. Last security review: 90 days ago. Deployments since: 2,700!!! The volume of code being deployed is crazy. ❓ That gap? That's where breaches live. ✳️ I work with a few talented engineers to develop a new product, Factor0, that addresses this insanity. 📢 Here is what my CISO friend told me about the existing problem. Instead of quarterly security reviews and sending pdf that nobody reads, build a threat model that moves at deployment speed. Here is what it means: 1️⃣ Your code changes at 10am 2️⃣ Your threat model updates at 10:01am 3️⃣ Attack paths visible at 10:02am ... and you saved an organization from disaster. Timing matters: ❇️ Real architecture from your ACTUAL codebase (not that Visio diagram from 2019) ❇️ Visual attack paths developers understand (not 300-page PDFs nobody reads) ❇️ Updates with every commit (not every quarter) 🎯 Traditional threat modeling is like having a bodyguard who shows up 4 times a year. Factor0 is the bodyguard who never leaves. ✴️ Engineering teams ship 10x daily. Security should too. Things will get worse as these volumes of code go up. And they will. 👉 Question for my network: How many deployments have you done since your last real security review? (Be honest, we're all guilty here) #devsecops #cybersecurity #cicd #security
5
-
James Sather
Google • 2K followers
Detect and Respond to Security Threats with Wiz and Google Cloud! In today's complex cloud environments, proactive threat detection is key. Check out our blog post with Wiz to see a detailed guide on how to protect your Google Cloud environment. Our new blog post covers: - Real-time threat detection with Wiz Defend - Cross-layer threat analysis - Use cases like detecting cryptojacking and data exposure Learn how to build a robust defense for your cloud infrastructure. #GoogleCloud #Wiz #CloudSecurity #ThreatResponse #Security #Cybersecurity https://google.smh.re/55nl
2
-
Rafael Santiago Achaerandio
JFrog • 10K followers
Most leaders know that managing 10+ different security tools is a headache, but now we have the data on exactly how much it’s costing you. A new Forrester Total Economic Impact™ (TEI) study commissioned by JFrog just dropped, and the results are a wake-up call for the industry: 282% ROI over three years. $5.4M in total quantified benefits. Payback in less than 6 months. When you consolidate your #SoftwareSupplyChain into a single platform, you aren't just "saving money"—you’re giving your developers 20% of their time back and fixing security gaps 80% faster. As I talk to new customers every day, the message is clear: Consolidation is no longer a luxury; it’s a competitive necessity in the AI era. 📊 Read the full "Bombshell" study here: https://bit.ly/3YWVxCj #JFrog #DevSecOps #ROI #TechLeadership #Forrester #SupplyChainSecurity
5
-
Nate Nead
HOLD.co • 28K followers
📖 https://lnkd.in/gd_4xgDN 🔓 Is OAuth Your Biggest Blind Spot? Most orgs trust OAuth like it's harmless plumbing. But attackers see it as a goldmine for silent lateral movement across cloud environments. One token—with the right scope—and they’re in your data, your resources, even your infrastructure. This blog breaks down how OAuth gets weaponized without tripping the usual alarms—and what defenders can do to shut the door before it's too late. Are your OAuth tokens letting attackers move freely behind the scenes? 👇 Let’s talk: What’s your org doing to lock down app-based access before it’s exploited?
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content