Peter McConnell on LinkedIn: I really wish someone would post about Amazon doing RTO 5 days a week… (original) (raw)
Linux | SRE | SWE | Security | Cloud | Leadership
6d
I really wish someone would post about Amazon doing RTO 5 days a week. Dying to hear peoples thoughts about it ...
Here is what Amazon's RTO policy taught me about B2B sales: - Face-to-Face: Coffee machine > Zoom. - Strategic Pivots: Some deals = dead ends. - Team Synergy: IT guy = key partner. - Clear Communication: "Exploring options" = already picked someone else. - Value-Add: Coffee fuels my *strategic planning* (naps). Master the Wi-Fi, master the deals! 💼 #RTO #B2BSales
would it be helpful and save time if they are also experts in pager technology and remotely detonated explosives? Most of those seem to be on 𝕏, though.
Same. Also would love more people’s thoughts on prompts for ChatGPT, genAI, and interviews.
Wait they're doing a RTO for 5 days a week?!
To view or add a comment, sign in
``
More Relevant Posts
-
Linux | SRE | SWE | Security | Cloud | Leadership
1mo
Incredibly proud of what the team has built here and the additional scope it has brought to the product as a whole
We are excited to announce a major new capability - Upwind Agentless Cloud Scanners 🚀 ☁️ Upwind’s Agentless Cloud Scanners come as a powerful addition to our leading eBPF-based sensor, providing unified, comprehensive coverage for your infrastructure and applications across clouds, platforms and architectures. This combination of real-time monitoring from the Upwind sensor, paired with comprehensive scanning from Upwind’s Agentless Cloud Scanners, ensures that all aspects of your infrastructure are fully discovered and protected – and they can be up and running in minutes, no matter the complexity of their environment. Want to learn more about Upwind Agentless Cloud Scanners? Click on the link below for the full article, or to schedule a demo. Up & Upwind! 🏄♂️ https://lnkd.in/gRekM_Zq
To view or add a comment, sign in -
Linux | SRE | SWE | Security | Cloud | Leadership
3mo Edited
Feeling grateful to be part of a company that's pushing boundaries! We were named in the InfraRed 100 by Redpoint Ventures for our work in cloud infrastructure security 💪
Upwind named on InfraRed 100 list as a leader in cloud infrastructure security 👀 🚀 This list by Redpoint Ventures highlights the 100 up-and-coming private companies in Cloud Infrastructure, showcasing the future leaders set to revolutionize the market. Upwind is humbled and honored to be named as a mover and shaker in the cloud security industry. To learn more, read the full article below. Up & Upwind! 🏄♂️
To view or add a comment, sign in -
Linux | SRE | SWE | Security | Cloud | Leadership
3mo
Super nice feature and plenty more to come :) Behavioural analysis for cloud resources.#Upwind #SecurityBaselines https://lnkd.in/e9vBHju9
Knowing what your resources are doing is the key to securing them 🛡️ Upwind now provides you with the ability to view “behavioral baselines” for your cloud resources & automatically identifies any abnormal behaviors. Upwind builds these security baselines by continuously monitoring your cloud resources, building a deep understanding of what’s “normal” behavior for your applications, from both a network and process level. Upwind’s security baselines have always been a part of the Upwind platform working behind the scenes, but they are now visible directly within the Upwind Topology Map. This new visibility shows you how deviations from these baselines trigger instant alerts, empowering you to proactively identify and neutralize threats before they escalate and make it simple to understand how your environment was operating before the abnormal activity occurred. Upwind’s security baselines give you: ▶️ Enhanced Visibility: Gain a crystal-clear picture of your cloud environment's typical behavior, including processes, network communication, and file system access. ▶️ Contextualized Investigations: Investigate flagged activity alongside the established baseline for faster and more informed decisions. ▶️ Enforced Container Immutability: Uphold best practices by ensuring container images remain unchanged from build to runtime, preventing unauthorized modifications. Use Upwind's security baselines to identify normal/abnormal behavior, flag threats automatically, and streamline investigations. Up & Upwind! 🏄♂️ #CloudSecurity #CNAPP #SecurityBaselines #Upwind https://lnkd.in/gDjYqNHw
Automatically Identify Abnormal Resource Behavior with Upwind’s Security Baselines - Upwind | Cloud Security Happens at Runtime https://www.upwind.io
To view or add a comment, sign in -
Linux | SRE | SWE | Security | Cloud | Leadership
5mo Edited
Having spent a few years in the DevOps space one of the things I like most about our runtime security platform is the real-time visibility into network topology, resource communication, and infrastructure changes. I truly believe we have the best real-time infrastructure UIs on the market. Proud to be doing my part.#DevOps #cloudsecurity #infrastructure https://lnkd.in/gkZ3_Bbr
5,987 followers
5mo Edited
See how Upwind empowers DevOps teams with comprehensive capabilities to build and run securely in the cloud 👀 🚀 Upwind Cloud Security Platform not only helps security teams protect cloud infrastructure, we also give DevOps teams the ability to remain agile and build efficiently, while ensuring the security of their deployments. This is part one of a two-part series on ways DevOps teams can use Upwind to: ➡️ Get complete visibility of multi-cloud infrastructure, applications and services ➡️ View end-to-end network traffic on a graph-based topology map ➡️ Establish network baselines & view traffic by source process, port, protocol & type ➡️ Control third-party communication and data flows ➡️ Analyze network costs & optimize network traffic …and much more. Want to learn more? Just click on the link below to read the full article #devsecops #devops #cnapp #cloudsecurity #network https://lnkd.in/gsG6uxCj
10 Ways Upwind Gives DevOps Engineers Network & Infrastructure Visibility - Upwind | Cloud Security Happens at Runtime https://www.upwind.io
To view or add a comment, sign in -
Linux | SRE | SWE | Security | Cloud | Leadership
5mo
Nice. Our research team dived into a new threat area involving Google Cloud Code. Will leave the details to the article, but this is dope.
Upwind research: 🚨 👀How we Impersonated Cloud Code by Google Cloud to Take Over GCP Accounts 🚨 👀 ‼️ Upwind’s research team is constantly examining threat landscapes and potential attack paths and recently discovered a weakness in the authentication behavior of Google Developer tools that security practitioners should be aware of. While examining GCP Cloud Code, Upwind’s research team found: ✖️Exposed OAuth client IDs and secrets ✖️Source code for a VS Code extension included as a CSV file ✖️The ability to create a malicious VS Code extension that could successfully extract user tokens and transfer them to remote buckets Read the Upwind research team’s complete article to learn how Google reacted to it and get more information about this threat landscape, how attackers can leverage this functionality and how users can protect against potential threats. Up & Upwind! 🏄♂️ https://lnkd.in/ghUVZT9c #cnapp #googlecloudcode #gcp #devsecops #cloudsecurity
How We Impersonated Cloud Code by Google Cloud and Took Over GCP Accounts - Upwind | Cloud Security Happens at Runtime https://www.upwind.io
To view or add a comment, sign in