Last week, Cloudera had the pleasure of sending its cybersecurity team down to Las Vegas for the 16th annual Black Hat conference. The conference brings together leaders in the information security (InfoSec) community to learn about how emerging technologies are being applied to fight cyber crime. Although the 2015 videos haven’t been posted yet, here is a link to Black Hat’s YouTube channel so that you can get a taste of the amazing discussions that take place at the conference.
One of my biggest take aways from the conference wasn’t learned in a break out session or keynote, it was learned through the conversations that I had with the attendees. Discussing everything from connected vehicle security to cyber espionage, I realized that the InfoSec community isn’t made up of suit wearing business professionals, but in fact hackers.
To any individuals outside of this community, the term hacker might be seen as an insult with the way the media has stigmatized the community with countless stories about breaches and stolen credit cards. However, speaking with these individuals you quickly learn that not everyone in the community is a bad actor. This curious, talented group of individuals live by a strict code of moral values and philosophies called the Hacker Ethic. The underlying theme of this code, and the theme of this year’s Black Hat keynote, technology should be open so that everyone can tinker with it.
So, adhering to the Hacker Ethic, I want to extend an invite to the attendees of Black Hat and the good actors within the hacker and InfoSec community, tinker with our technology. Go ahead, it’s free and open. Download our open source Hadoop platform or spin up a cloud environment today. Store some event information on it, run some analyses against it, and learn for yourself just how powerful the Hadoop platform is for analyzing terabytes worth of information to quickly and accurately identify novel threats and malicious activity without generating terabytes worth of false positives. Hopefully in doing so we can help protect organizations, keeping them out of the press, and in turn, restore the public perception of hackers to its rightful place as the heroes of the computer revolution.