Remove Cloud Migration Remove Digital transformation Remove Threat Detection
article thumbnail

The Impact of Remote Work and Cloud Migrations on Security Perimeters

Security Affairs

Traditional security approaches, which rely on static defenses, are insufficient to address the evolving threat landscape in the cloud. Her experience spans B2B tech, with a lot of focus on cybersecurity, cloud, enterprise, digital transformation, and data centre.

article thumbnail

Anton’s Security Blog Quarterly Q3 2024

Anton on Security

Beware: Clown-grade SOCs Still Abound Detection Engineering is Painful — and It Shouldn’t Be (Part 1) [now a 10 post series, not yet finished…] Why is Threat Detection Hard? New Office of the CISO Paper: Organizing Security for Digital Transformation Top 10 Cloud Security Podcast by Google episodes (excluding the oldest 3!):

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to shift into a new approach to cybersecurity asset management

CyberSecurity Insiders

The effects of the global pandemic pushed organizations to accelerate their digital transformation strategies. Because of this, companies in all industries were faced with an array of new technologies like cloud and containers that support the shift to edge computing and remote workers.

article thumbnail

Anton’s Security Blog Quarterly Q3 2024

Security Boulevard

Beware: Clown-grade SOCs Still Abound Detection Engineering is Painful — and It Shouldn’t Be (Part 1) Why is Threat Detection Hard? Revisiting the Visibility Triad for 2020” “ Beware: Clown-grade SOCs Still Abound ” “Why is Threat Detection Hard?” “A How to Solve the Mystery of Cloud Defense in Depth?”

article thumbnail

Anton’s Security Blog Quarterly Q4 2024

Anton on Security

Detection Engineering is Painfuland It Shouldnt Be (Part1) Revisiting the Visibility Triad for 2020 (update for 2024 is coming soonBTW!) Beware: Clown-grade SOCs StillAbound Why is Threat Detection Hard? A SOC Tried To Detect Threats in the Cloud You Wont Believe What HappenedNext Top 10 SIEM Log Sources in Real Life?