Remove category podcasts
article thumbnail

How I pwned an ex-CISO and the Smashing Security Podcast

Javvad Malik

Of course texting a friend and getting a response doesn’t really fall under that category. Thom was recording a podcast with Graham and Carole of Smashing Security. We ended up gatecrashing the podcast recording. It would be a really poor world if we distrusted everyone and everything.

article thumbnail

Does the World Need Cloud Detection and Response (CDR)?

Anton on Security

Furthermore, at RSA 2022 , I have looked at vendors like Cado and Mitiga (among others) and I noticed that focus on incident response in the cloud does call for tools that are different enough (BTW, a podcast on how we do it here is coming soon). Agree/disagree? P.S. I first saw the term CDR in Sift Security messaging around 2017.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Make Threat Detection Better?

Anton on Security

Economies of scale here may translate into missed attackers … Also, there will be a category of people that will say that the answer is …. Related blog posts: “Modern Threat Detection at Google” (ep17) “Security Correlation Then and Now: A Sad Truth About SIEM” “What Are You NOT Detecting?” “Can drumroll … machine learning.

article thumbnail

Magnificent Seven: Celebrating Great Women in Cybersecurity and Data Protection

BH Consulting

Valerie Lyons BH Consulting’s Chief Operations Officer and a Senior Cybersecurity and Data Protection Consultant, Dr. Valerie Lyons is a published author of ‘The Privacy Leader Compass’, which in just a few short weeks at the end of 2023, became the year’s bestselling title in its category.

article thumbnail

How Design Thinking Drives People-Focused Innovation at Duo: Design Thinking in Action

Duo's Security Blog

The Duo Blog caught up with some Duo team members to learn why they got involved with design thinking and how it’s impacted them. Ahead of the workshop, the participants organized their data into categories. We didn’t know how to translate our pages and pages and hours and hours of notes into actionable next steps.”

article thumbnail

Does the World Need Cloud Detection and Response (CDR)?

Security Boulevard

Furthermore, at RSA 2022 , I have looked at vendors like Cado and Mitiga (among others) and I noticed that focus on incident response in the cloud does call for tools that are different enough (BTW, a podcast on how we do it here is coming soon). Related blog posts: “How to Think about Threat Detection in the Cloud”. Agree/disagree?

article thumbnail

How to Make Threat Detection Better?

Security Boulevard

Also, there will be a category of people that will say that the answer is …. Related blog posts: “Modern Threat Detection at Google” (ep17). Our Cloud Security Podcast by Google :-). Even more worse , sometimes you can spot an MSSP that simply relies on commercial SIEM stock detection rules. drumroll … machine learning.