Are problems associated with containers--like bloat and CVEs--being imported into your AI applications, causing pain and frustration for your team? Chainguard recently conducted research with data scientists, machine learning engineers, and AI practitioners on this topic. Join Chainguard's Erin Rose Glass, PhD, John Speed Meyers, Yurts' Nick Weir, and our ownm Jimmy Mesta 🤙 for a conversation exploring the challenges teams face when deploying AI in containers next Wednesday, Nov. 6! Link to register in comments!
RAD Security
Computer and Network Security
San Francisco, California 4,089 followers
Detect and respond to cloud threats earlier with behavioral runtime verification.
About us
In sharp contrast to one-size-fits-all, legacy CWPP and container detection and response solutions, RAD takes a custom, behavioral approach to cloud native detection and response that can counter evolving threats while sharpening inputs into shift-left and posture management.
- Website
-
https://rad.security
External link for RAD Security
- Industry
- Computer and Network Security
- Company size
- 11-50 employees
- Headquarters
- San Francisco, California
- Type
- Privately Held
- Founded
- 2021
- Specialties
- Cloud-Native Security, Kubernetes, AWS, Microsoft Azure, Google Cloud Platform, Docker, Security, cloud security, Kubernetes Security, Kubernetes RBAC, Kubernetes Admission Control, Kubernetes Security Posture Management, Kubernetes misconfigurations, AKS, EKS, and GKE
Locations
-
Primary
584 Castro St
#2185
San Francisco, California 94114, US
Employees at RAD Security
-
Greg Dracon
Partner at .406 Ventures
-
Sandeep Bhadra
seed/Series A investor in enterprise/infrastructure software companies
-
Rick Vadgama, CISSP
Chief Information Security Officer (CISO) | Board Member | Security and Privacy Leader | Advisor
-
Jeffrey Friedman
Director of Engineering / Staff Software Eng
Updates
-
Sad truths about #womenincyber: 👩💻 Less than ~1% of Cybersecurity vendors have female CEO/Founders 💰 Only 2.2% of VC funding goes to female founded security vendors. Brooke M. and Barbara Massa will join Elle Zoma's upcoming Cyber GTM Girl Talk podcast, imparting advice and inspiration for other females out there who are either current or aspiring female CEOs/Founders navigating the security space. 👀 Stay tuned for the episode to drop soon!
-
As the election approaches, threats to election security have become more sophisticated; no longer just data theft, but direct attempts to manipulate results, disrupt operations, and erode public confidence. Check out our blog on the Executive Order on Improving the Nation's Cybersecurity and CISA's #Protect2024 initiative. We cover the 10 cyber security threats teams should prepare for before the election, and the top 5 areas of focus to mitigate these threats. https://lnkd.in/gTisPuZs
-
Do you have an initiative to level up your cloud security game? Our CDR Buyers Guide covers: 💥 Defining CDR category - What's in, what's out, and why? What do the attacks tell us? 👉 The 'must-haves' for CDR, including real-time posture, behavioral detection and context from identities and infrastructure 👀 Technical RFP criteria for each of the CDR must-haves that cut across well-known categories like KSPM, CSPM, Runtime Security and Software Supply Chain Security https://lnkd.in/ewd7mw2v
-
We're #hiring a new Senior AI Security Researcher (Remote). This is a high-impact, senior-level role with a focus on advancing our AI-driven security solutions. This person will lead and own the AI stack within our product, working closely with the CTO and engineering team to fine-tune existing AI models, develop new approaches to enhance detection capabilities, and find innovative ways to integrate AI into our security platform. With our behavioral-based cloud detection and response platform, RAD Security is the leader in the emerging market of cloud detection and response. Our team consists of cutting edge innovators based all around the globe. Sound like a fit? Apply today! https://lnkd.in/gvdVUKzB
-
An important distinction... which is why we built a behavioral-based CDR that detects and responds to cloud threats earlier with behavioral runtime verification.
Re-iterating my thoughts on CDR because I think it's an important distinction: CDR = Detection and Response to Cloud Attacks, spanning workload or cloud resources. CDR != Detection and Response to Cloud Misconfigurations. My CSPM is just fine at screaming at me 24/7 for all the misconfigurations in my environment, it's not so good at telling me there's something that needs immediate attention on a workload getting exploited. Key word here is that it IS getting exploited, not that it COULD be exploited. This is why CDR needs an agent - can't tell a workload's getting exploited if you can't see the workload 🤷♂️ Real CDR = Sweet Security, ARMO, RAD Security, Operant AI, Spyderbat Real CDR in a CNAPP wrapper = Upwind Security, Sysdig, Aqua Security, Cyscale, Deepfence Inc, AccuKnox, Tigera, Uptycs, Wiz Full Article:
-
🔥 Effective prioritization of critical vulnerabilities 👀 Deep visibility into their cloud native environment Learn more about why a leading travel platform chose RAD Security for their cloud detection and response: https://lnkd.in/guSmbwSb
-
Are problems associated with containers--like bloat and CVEs--being imported into your AI applications, causing pain and frustration for your team? Chainguard recently conducted research with data scientists, machine learning engineers, and AI practitioners on this topic, and our own Jimmy Mesta 🤙 is participating in their upcoming webinar to explore the challenges teams face when deploying AI in containers. He'll be joining John Speed Meyers and Erin Rose Glass, PhD of Chainguard and Nick Weir of Yurts for this insightful conversation. Join us Nov. 6th - link to register in comments!
-
Last chance to register for today's webinar! Join Lisa Hall, the CISO at Safebase, and our Co-Founder and CTO, Jimmy Mesta 🤙 for a discussion on Doing More with Less: How Security Teams are Embracing Efficiency. Link to register in comments :)