This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Amazingly, Medium has fixed the stats so my blog/podcast quarterly is back to life. As before , this covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast ( subscribe ). A SOC Tried To DetectThreats in the Cloud You Wont Believe What HappenedNext Top 10 SIEM Log Sources in Real Life?
Amazingly, Medium has fixed the stats so my blog/podcast quarterly is back to life. As before , this covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast ( subscribe ). Revisiting the Visibility Triad for 2020” “ Beware: Clown-grade SOCs Still Abound ” “Why is ThreatDetection Hard?” “A
Great blog posts are sometimes hard to find (especially on Medium ), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast too ( subscribe ). Why Is ThreatDetection Hard?”
Great blog posts are sometimes hard to find (especially on Medium ), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast too ( subscribe ). Why Is ThreatDetection Hard?”
Great blog posts are sometimes hard to find (especially on Medium ), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast too ( subscribe ). Why Is ThreatDetection Hard?”
Sometimes great old blog posts are hard to find (especially on Medium …), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. It covers both Anton on Security and my posts from Google Cloud blog [and now our Cloud Security Podcast too!] Skills, Not Tiers”” “Why is ThreatDetection Hard?”
Splunk’s inability to migrate to a modern cloud-native architecture makes it difficult to take advantage of these cost-saving benefits or implement advanced data science use cases critical for threatdetection. Impactful analysis A decoupled, purpose-built threatdetection platform can work across distributed data lake architectures.
But as a CISO or cyber risk owner, it’s not just about locking down sensitive informationits about doing it without slowing down your people. This is where the real opportunity lies, and what Im exploring in this blog. For CISOs and cyber risk owners, this isnt just a riskits a gamble no one can afford to take.
In this blog, we’ll look at the root causes of concern for today's CISO and share some practical strategies to deter cybercriminals. The CISO role can be an unenviable one. Is the cyber deck stacked against today's CISO? As CISO, you are usually accountable for the security of the application fleet.
In this blog, I’ll be exploring some of the main cracks in current cybersecurity defence approaches specifically around Secure Operation Centres (SOCs) and the value that CISOs and ITDMs are currently getting from their internal teams and third-party providers. You know economic downturns incentivise cybercriminals.
Amazingly, Medium has fixed the stats so my blog/podcast quarterly is back to life. As before , this covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast ( subscribe ). A SOC Tried To DetectThreats in the Cloud You Wont Believe What HappenedNext Top 10 SIEM Log Sources in Real Life?
Amazingly, Medium has fixed the stats so my blog/podcast quarterly is back to life. As before , this covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast ( subscribe ). Revisiting the Visibility Triad for 2020” “ Beware: Clown-grade SOCs Still Abound ” “Why is ThreatDetection Hard?” “A
In addition to publishing blogs and papers, our Cloud Security Podcast by Google episodes have featured experts discussing AIs impact on security, offering practical implementation advice, and addressing emerging challenges. A recap of our key blogs, papers and podcasts on AI security in 2024follows.
Sometimes great old blog posts are hard to find (especially on Medium …), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. It covers both Anton on Security and my posts from Google Cloud blog [and now our Cloud Security Podcast too!]. Why is ThreatDetection Hard?”.
Hence this blog was born. A new CISO comes in, tries to champion the implementation of a new tool, the CISO is gone after a short amount of time?—?like like most CISOs, and then a new CISO comes in and tries it all over again. BTW, if somebody wakes me up at 3:00 a.m. I would name the loss of executive commitment.
For example , Accurate ThreatDetection was one of our top drivers , but what technologies, processes, and staffing models help achieve success in this arena ? What about insourcing or outsourcing threat management? . Figure 2: Effect of staffing models on perceived threatdetection and incident response capabilities.
Great blog posts are sometimes hard to find (especially on Medium ), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast too ( subscribe ). Why Is ThreatDetection Hard?”
The painful impact of cyber attacks on businesses is worsening despite advances in technology aimed at protecting enterprises from malicious network traffic, insider threats, malware, denial of service attacks and phishing campaigns. This has left many CISOs questioning if today’s incumbent cybersecurity solutions are enough.
Chris Clements, VP of Solutions Architecture at CISO Global High-Tech Pest Control = ThreatDetection & Response Imagine for a moment that your home has a rodent problem. To address this, you install a fancy system designed to automatically detect and trap animals before they can roam around your house and cause any damage.
In case you missed them, below is a brief recap of some of the Cisco sessions, including a fight that almost broke out between the Incident Response (IR) team represented by Matt Olney, Talos’ Intel Director, and Wendy Nather, Head of Advisory CISOs. Read on for details…. ” -Wendy Nather. Don’t Set It and Forget It.
Shannon Lawson, CISO for the City of Phoenix, and Geoffrey Coulehan, Head of Sales for MixMode recently joined forces for a fireside chat at the Evanta CISO Summit in Phoenix, AZ. The post Video: Modernizing Phoenix’s Cybersecurity to Combat Nation-State Attacks appeared first on Security Boulevard.
In addition to publishing blogs and papers, our Cloud Security Podcast by Google episodes have featured experts discussing AIs impact on security, offering practical implementation advice, and addressing emerging challenges. A recap of our key blogs, papers and podcasts on AI security in 2024follows.
On the other hand, it’s been portrayed as a potential threat to our privacy, security, creativity and even mankind’s existence. This is what I’ll be delving into in this blog, where I’ll be exploring how these two fields are intersecting and what that means for our digital landscape.
In our last blog , we gave a rundown of what the Telecommunications (Security) Act (TSA) is, why it’s been introduced, who it affects, when it starts, and how firms can prepare. ny of the themes introduced in the code of practice can be aligned with the themes in a zero trust security model, which are also a focus for CISOs.
We recently released a new video to better explain how MixMode’s next-generation cybersecurity anomaly detection platform combines the functionality of SIEM, NDR, NTA and UEBA for advanced threatdetection, zero day attack identification, false positive alert reduction, forensic investigation and more.
This panoramic view can then be leveraged by Duo to inform enforcement points, perform Identity ThreatDetection & Response (ITDR) , and proactively harden your Identity and Access Management (IAM) posture. The advantages are clear and twofold.
As the global CISO of Mediapro, Roberto has deployed Cisco SecureX together with Umbrella, Secure Endpoint, Secure Firewall, ISE, NGIP, Threat Response, AnyConnect, and Web security. With this partnership, Mediapro has reduced its threatdetection time by 90%. Let’s meet our League of Cybersecurity Heroes: Roberto Alunda.
AI plays a dual role: it enhances threat actors capabilities, leading to more efficient and widespread attacks, but it also offers defensive potential through AI-supported threatdetection. Links we liked Help Net Security rounds up insights into CISO thinking and strategy. MORE Sigh.
Tired: Zero Trust is a Journey Wired: Zero Trust is a Transformation Inspired: Zero Trust is About Relationships So many CIOs and CISOs I engage with are over it. They’re done with hearing from vendors who endlessly repeat the phrase “zero trust is a journey.”
These playbooks are then used to trigger automated responses to known threats, thus relieving a human analyst from having to manually filter vast tiers of threat data. The company was founded in 2013 by Ryan Trost and Wayne Chiang, who saw a need for a smarter approach to aggregating, organizing and maintaining threat intel.
Plus, a PwC study says increased collaboration between CISOs and fellow CxOs boosts cyber resilience. Organizations feel most vulnerable to the threats that worry them the most, including cloud risks, hack-and-leak attacks and third-party breaches. Meanwhile, a report finds the top cyber skills gaps are in cloud security and AI.
According to Mick Jenkins, CISO at Brunel University London , “The streamlined platform approach has been quite easy for our security analysts to work with, and we’ve already seen evidence of shortened threatdetection times.”. New platform innovations. And watch CEO Chuck Robbins’ keynote if you missed it!
As we mentioned in March , we align XDR with MITRE to greatly expand the depth of our investigation, threatdetection, and prevention capabilities to prevent the attack chain with relevant insights. The post Why an Ounce of Cybersecurity Prevention is Worth a Pound of Detection appeared first on McAfee Blogs. View Now.
Unlike traditional applications, GenAI introduced unique threat models, including risks of accidental data leakage and adversarial attacks aimed at poisoning AI outputs. Follow Zscaler ThreatLabz on X (Twitter) and our Security Research Blog to stay on top of the latest cyberthreats and security research.
"Not only are cybercriminals targeting the overall logistics, freight, rail, and entire supply chain companies, this highlights yet again that we need to be more vigilant in protecting our supply chain," said Erika Voss , CISO, DAT Freight & Analytics. Increased interconnectivity means an increased cyberattack surface.
“The Apache Log4j security flaw has the potential to have a major impact on enterprises around the world, and it’s critical that security teams take immediate action to patch the vulnerability,” said David Norlin, CISO of Datashield. Any customers who need assistance should contact NetWitness immediately. ABOUT NetWitness.
Hence this blog was born. A new CISO comes in, tries to champion the implementation of a new tool, the CISO is gone after a short amount of time?—?like like most CISOs, and then a new CISO comes in and tries it all over again. BTW, if somebody wakes me up at 3:00 a.m. I would name the loss of executive commitment.
According to a blog penned by the Okta CISO, here’s what happened: On January 20 2022, a third-party customer support engineer working for Okta had their account compromised by Lapsus$. SOC Detection Rules for Okta. The first known extortion attempt by Lapsus$ included the Brazil Health Ministry in December of 2021.
Despite the similarity in name to endpoint detection and response (EDR) technology, MDR providers are more like general managed security service providers (MSSPs) , operating on all layers of an organization’s infrastructure, including the network, endpoints, applications and other IT resources. Secureworks. Armor Anywhere.
One of the biggest issues with XDR platforms, according to Gartner , is a “lack of diversity in threat intel and defensive techniques.” Not only does it actively align with MITRE attack insights for the investigation, it offer s complete mapping to predicted and prioritized threat campaigns before they hit your organization.
It offers a unique environment and is increasingly becoming a logical target for all manner of threat actors, from criminal syndicates to sophisticated state sponsored attackers and hacktivists simply because they hold sensitive client information, handle significant funds, and act as intermediaries in commercial and business transactions.
We described in the previous blog post the difference between vulnerability management and risk management. A quick reminder: vulnerabilities are the weaknesses an organization has internally while risks are the threats existing externally that potentially could harm the organization. times in the first year alone.
Great blog posts are sometimes hard to find (especially on Medium ), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast too ( subscribe ). Why Is ThreatDetection Hard?”
Of Gartner ’ s Top 9 Security and Risk Trends for 2020 , “ Extended detection and response capabilities emerge to improve accuracy and productivity ” ranked as their #1 trend. McAfee can help bridge this gap by offering organisations a global outlook across the entire threat landscape with local context to respond appropriately.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content