article thumbnail

Security Incident Response in the Cloud: A Few Ideas

Anton on Security

This quick blog is essentially a summary of our (joint with Marshall from Mandiant ) Google Cloud Next 2022 conference presentation ( video ) and a pointer to a just-released podcast on the same topic?—?security Here are the similarities : Data preservation requirements. Log data needs to be retained, normalized, and analyzed.

article thumbnail

Security Incident Response in the Cloud: A Few Ideas

Security Boulevard

This quick blog is essentially a summary of our (joint with Marshall from Mandiant ) Google Cloud Next 2022 conference presentation ( video ) and a pointer to a just-released podcast on the same topic?—?security Here are the similarities : Data preservation requirements. Log data needs to be retained, normalized, and analyzed.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AON ACQUIRES CYTELLIGENCE, A LEADING INTERNATIONAL CYBER SECURITY FIRM WITH DEEP EXPERTISE IN CYBER INCIDENT RESPONSE AND DIGITAL FORENSIC INVESTIGATIONS

Cytelligence

According to Aon’s 2019 Global Risk Management Survey , cyber-attacks were identified as a top ten risk facing organizations and is predicted to be one of the top three risks for organizations in 2022. “As said J Hogg, CEO of Aon Cyber Solutions. said Daniel Tobok, CEO of Cytelligence.

article thumbnail

Reverse, Reveal, Recover: Windows Defender Quarantine Forensics

Fox IT

On NTFS file systems, a file can have multiple data attributes or streams: the “main” unnamed data stream and optionally other named data streams, often referred to as “alternate data streams” For example, the Zone Identifier is stored in a seperate Zone.Identifier data stream of a file.