This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Why Is ThreatDetection Hard?” New Paper: “Future of the SOC: SOC People — Skills, Not Tiers”” “Revisiting the Visibility Triad for 2020” “ New Paper: “Future of the SOC: Forces shaping modern security operations” ” “ Beware: Clown-grade SOCs Still Abound ” “Why is ThreatDetection Hard?” “A What Does This Even Mean?!” “How
“New Paper: “Future of the SOC: SOC People — Skills, Not Tiers” ” “Revisiting the Visibility Triad for 2020” “A SOC Tried To DetectThreats in the Cloud … You Won’t Believe What Happened Next” “Why is ThreatDetection Hard?” Why Is ThreatDetection Hard?” Is Your Fate In the Cloud?”
Beware: Clown-grade SOCs Still Abound Detection Engineering is Painful — and It Shouldn’t Be (Part 1) [now a 10 post series, not yet finished…] Why is ThreatDetection Hard? Revisiting the Visibility Triad for 2020” “ Beware: Clown-grade SOCs Still Abound ” “Why is ThreatDetection Hard?” “A Use Cloud Securely?
Why Is ThreatDetection Hard?” Stop Trying to Take Humans Out of SOC … Except … Wait… Wait… Wait…” Top 5 Cloud Security Podcast by Google episodes: Episode 1“Confidentially Speaking” Episode 2 “Data Security in the Cloud” EP47 “Megatrends, Macro-changes, Microservices, Oh My! “New What Does This Even Mean?!” “Who
Beware: Clown-grade SOCs Still Abound Detection Engineering is Painful — and It Shouldn’t Be (Part 1) Why is ThreatDetection Hard? Revisiting the Visibility Triad for 2020” “ Beware: Clown-grade SOCs Still Abound ” “Why is ThreatDetection Hard?” “A How to Solve the Mystery of Cloud Defense in Depth?”
Why Is ThreatDetection Hard?” Stop Trying to Take Humans Out of SOC … Except … Wait… Wait… Wait…” Top 5 Cloud Security Podcast by Google episodes: Episode 1“Confidentially Speaking” Episode 2 “Data Security in the Cloud” EP47 “Megatrends, Macro-changes, Microservices, Oh My! “New What Does This Even Mean?!” “Who
Insecure Cloud Provider Default Settings Insecure cloud provider default settings occur when an organization’s security rules fail to satisfy its requirements. Crowdstrike’s 2023cloud risk report discovered that 36% of reported misconfigurations are due to insecure default settings.
Compare these expenditures against the potential savings and efficiencies from cloudmigration. Your assessment helps your business justify the transition to the cloud and shows potential productivity and cost-effectiveness gains. These situations demonstrate how gaps in cloud security can cause severe disruptions.
Detection Engineering is Painfuland It Shouldnt Be (Part1) Revisiting the Visibility Triad for 2020 (update for 2024 is coming soonBTW!) Beware: Clown-grade SOCs StillAbound Why is ThreatDetection Hard? A SOC Tried To DetectThreats in the Cloud You Wont Believe What HappenedNext Top 10 SIEM Log Sources in Real Life?
EP171 GenAI in the Wrong Hands: Unmasking the Threat of Malicious AI and Defending Against the Dark Side because few guests told AI for evil stories that well EP18 More CloudMigration Security Lessons for a set of hard-earned security client lessons EP54 Container Security: The Past or The Future? We Are Almost 3!
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content