This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Cloud Access Security Brokers (CASBs), referred to as “caz-bees,” are well-positioned to help companies navigate this shifting landscape. So if you’re a Microsoft shop, you’re on an Office 365 and a Windows 10 migration path. Some CISOs, at first, were reserved and said, ‘We’re not moving to the cloud.’
I had the chance to discuss this with Shinichi Yokohama, NTT Global CISO and John Petrie, Counselor to the NTT Global CISO, at RSA Conference 2023. We must protect the cloud, and, in some cases, we must protect on-prem systems that aren’t ever going to be in the cloud, as well. And that’s no small task.
Skills, Not Tiers”” “ New Paper: “Future of the SOC: Forces shaping modern security operations” ” “ Beware: Clown-grade SOCs Still Abound ” “Revisiting the Visibility Triad for 2020” “Stop Trying to Take Humans Out of SOC … Except … Wait… Wait… Wait…” “Why is Threat Detection Hard?” “A Is Your Fate In the Cloud?”
Revisiting the Visibility Triad for 2020 (update for 2024 is coming soon BTW!) New Office of the CISO Paper: Organizing Security for Digital Transformation Top 10 Cloud Security Podcast by Google episodes (excluding the oldest 3!): CloudMigration Security Woes” “Move to Cloud: A Chance to Finally Transform Security?”
Skills, Not Tiers”” “Beware: Clown-grade SOCs Still Abound” “Stop Trying to Take Humans Out of SOC … Except … Wait… Wait… Wait…” “Revisiting the Visibility Triad for 2020” “Why is Threat Detection Hard?” “A A SOC Tried To Detect Threats in the Cloud … You Won’t Believe What Happened Next” ”Top 10 SIEM Log Sources in Real Life?”
The rise in remote work means that many organizations are managing a complex web of in-person, online, and hybrid work scenarios while also juggling cloudmigration to support their diversified workforce. 1] For Chief Information Security Officers (CISOs), this has created a variety of new challenges to contend with.
Revisiting the Visibility Triad for 2020” “New Paper: “Future of the SOC: Forces shaping modern security operations”” “Top 10 SIEM Log Sources in Real Life?” CloudMigration Security Woes” “Is Your Fate In the Cloud?” New Paper: “Future of the SOC: SOC People?—?Skills, Skills, Not Tiers”” “Why is Threat Detection Hard?”
New Paper: “Future of the SOC: SOC People — Skills, Not Tiers”” “Revisiting the Visibility Triad for 2020” “ New Paper: “Future of the SOC: Forces shaping modern security operations” ” “ Beware: Clown-grade SOCs Still Abound ” “Why is Threat Detection Hard?” “A What Does This Even Mean?!” “How
New Paper: “Future of the SOC: SOC People — Skills, Not Tiers” ” “Revisiting the Visibility Triad for 2020” “A SOC Tried To Detect Threats in the Cloud … You Won’t Believe What Happened Next” “Why is Threat Detection Hard?” Use Cloud Securely? Is Your Fate In the Cloud?” What Does This Even Mean?!” “How
As just one measure, the number of data breaches in the first nine months of 2021 exceeded all those in 2020, a new record. Two-thirds of the global population will be protected by privacy regulations by 2023, and 70% of organizations say such regulations make cloudmigrations and analytics more difficult.
Revisiting the Visibility Triad for 2020”. Data security: “New whitepaper: Designing and deploying a data security strategy with Google Cloud” [GCP Blog]. Cloud security: “Move to Cloud: A Chance to Finally Transform Security?”. CloudMigration Security Woes”. “Is Is Your Fate In the Cloud?”.
A SOC Tried To Detect Threats in the Cloud … You Won’t Believe What Happened Next” ”Top 10 SIEM Log Sources in Real Life?” Who Does What In Cloud Threat Detection?” “A What Does This Even Mean?!” “Who
Revisiting the Visibility Triad for 2020 (update for 2024 is coming soon BTW!) Security operations / detection & response: “Security Correlation Then and Now: A Sad Truth About SIEM” Migrate Off That Old SIEM Already! How CISOs need to adapt their mental models for cloud security” “Who Does What In Cloud Threat Detection?”
Not everyone would describe cloud security as "very exciting," however, the four expert panelists who joined us on our series of SecureWorld Remote Sessions for a Q&A hour all certainly shared this sentiment. The panelists spoke on cloudmigration, the state of the cloud during the pandemic, the DevOps pipeline, and more.
Forrester also predicts that the number of women CISOs at Fortune 500 companies will rise to 20 percent in 2019 , compared with 13 percent in 2017. Women in Cloud and Security – A Panel with McAfee, AWS, and Our Customers. Thursday, November 5, 2020. Join McAfee in our Women in Cloud and Security Panel. Live Panel.
A SOC Tried To Detect Threats in the Cloud … You Won’t Believe What Happened Next” ”Top 10 SIEM Log Sources in Real Life?” Who Does What In Cloud Threat Detection?” “A What Does This Even Mean?!” “Who
A little more than a year ago I had the opportunity to interview 40 CISOs about their enterprise access challenges. They weighed the weaknesses of these approaches, from operational issues to end-user experience and poor security against other priorities related to digital transformation and cloudmigrations.
Revisiting the Visibility Triad for 2020”. A SOC Tried To Detect Threats in the Cloud … You Won’t Believe What Happened Next”. Best kept security secrets: How Cloud EKM can help resolve the cloud trust paradox” [GCP blog]. Cloud security: “How CISOs need to adapt their mental models for cloud security” [GCP blog].
In a move that could bring some relief to organizations looking to secure their cloudmigrations, Amazon Web Services on Friday announced that it had acquired Wickr, provider of secure end-to-end encryption and communications platform.
Revisiting the Visibility Triad for 2020”. A SOC Tried To Detect Threats in the Cloud … You Won’t Believe What Happened Next”. Cloud security: “How CISOs need to adapt their mental models for cloud security” [GCP blog]. How to think about threat detection in the cloud” [GCP blog]. “A Skills, Not Tiers””.
Tech skills like programming, software development, big data, cybersecurity, cloudmigration along with skills that computers can’t yet capably do, like creative thinking, problem-solving, negotiating, and applying emotional intelligence, are going to be in high demand. Predicting the rain doesn’t count, building an ark does.”
Detection Engineering is Painfuland It Shouldnt Be (Part1) Revisiting the Visibility Triad for 2020 (update for 2024 is coming soonBTW!) A SOC Tried To Detect Threats in the Cloud You Wont Believe What HappenedNext Top 10 SIEM Log Sources in Real Life? CloudMigration SecurityWoes Move to Cloud: A Chance to Finally Transform Security?
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content