This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Detection Engineering is Painfuland It Shouldnt Be (Part1) NEW Antons Alert Fatigue: TheStudy Revisiting the Visibility Triad for 2020 (update for 2025 is comingsoon) Beware: Clown-grade SOCs StillAbound Why is Threat Detection Hard? ( NEWERVERSION ) Debating SIEM in 2023, Part1 Debating SIEM in 2023, Part2 Log Centralization: The End IsNigh?
Beware: Clown-grade SOCs Still Abound Detection Engineering is Painful — and It Shouldn’t Be (Part 1) [now a 10 post series, not yet finished…] Why is Threat Detection Hard? New Office of the CISO Paper: Organizing Security for Digital Transformation Top 10 Cloud Security Podcast by Google episodes (excluding the oldest 3!):
. “Cloud-born edge infrastructure solutions are altering the way we engage with each other and interact with physical spaces in offices, schools, and venues. Patel “Cloudmigration strategies for anywhere access to enterprise apps is top of mind for all IT executives, creating a tremendous opportunity for Nile.
Use Cloud Securely? How CISOs need to adapt their mental models for cloud security” [GCP blog] “How to think about threat detection in the cloud” [GCP blog] “Who Does What In Cloud Threat Detection?” CloudMigration Security Woes” “Move to Cloud: A Chance to Finally Transform Security?” “Is
Forrester also predicts that the number of women CISOs at Fortune 500 companies will rise to 20 percent in 2019 , compared with 13 percent in 2017. Director/CISO of IT Risk Management. Director/CISO of IT Risk Management at Ulta Beauty located in Bolingbrook, IL. Alexandra holds a B.S. Diane Brown. Ulta Beauty.
Beware: Clown-grade SOCs Still Abound Detection Engineering is Painful — and It Shouldn’t Be (Part 1) Why is Threat Detection Hard? How CISOs need to adapt their mental models for cloud security” “Who Does What In Cloud Threat Detection?” Revisiting the Visibility Triad for 2020 (update for 2024 is coming soon BTW!)
Detection Engineering is Painfuland It Shouldnt Be (Part1) NEW Antons Alert Fatigue: TheStudy Revisiting the Visibility Triad for 2020 (update for 2025 is comingsoon) Beware: Clown-grade SOCs StillAbound Why is Threat Detection Hard? ( NEWERVERSION ) Debating SIEM in 2023, Part1 Debating SIEM in 2023, Part2 Log Centralization: The End IsNigh?
Yet I reckon that while they play a role in security incidents, they don’t plan an outsized role that cloud misconfigurations do. Similarly, to compromise a modern mobile device, you probably would use social engineering or an exploit, not a configuration weakness. How to Solve the Mystery of Cloud Defense in Depth?”
Tech skills like programming, software development, big data, cybersecurity, cloudmigration along with skills that computers can’t yet capably do, like creative thinking, problem-solving, negotiating, and applying emotional intelligence, are going to be in high demand. What training investment tips do you have?
Yet I reckon that while they play a role in security incidents, they don’t plan an outsized role that cloud misconfigurations do. Similarly, to compromise a modern mobile device, you probably would use social engineering or an exploit, not a configuration weakness. How to Solve the Mystery of Cloud Defense in Depth?”
Data Security in the Cloud“. The Mysteries of Detection Engineering: Revealed! “. EP58 SOC is Not Dead: How to Grow and Develop Your SOC for Cloud”. EP58 SOC is Not Dead: How to Grow and Develop Your SOC for Cloud”. The Mysteries of Detection Engineering: Revealed! “. Cloudmigration (top 5).
Detection Engineering is Painfuland It Shouldnt Be (Part1) Revisiting the Visibility Triad for 2020 (update for 2024 is coming soonBTW!) SIEM Content, False Positives and Engineering (Or Not) Security Modern SecOps Masterclass: Now Available on Coursera (if you only read one, choose thisone !) How to Make Threat Detection Better?
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content