Remove 2020 Remove Blog Remove Technology Remove Threat Detection
article thumbnail

Anton’s Security Blog Quarterly Q4 2021

Security Boulevard

Sometimes great old blog posts are hard to find (especially on Medium ) , so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast too ( subscribe ). Revisiting the Visibility Triad for 2020”.

article thumbnail

Anton’s Security Blog Quarterly Q4 2021

Anton on Security

Sometimes great old blog posts are hard to find (especially on Medium ) , so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast too ( subscribe ). Why Is Threat Detection Hard?” “A

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Changing Face of Data Security in Australia and New Zealand

Thales Cloud Protection & Licensing

The traditional focus on security has been on breach prevention and threat detection but these can only go so far. According to Domo CEO Josh James’ recent blog post “By 2020, there will be 40x more bytes of data than there are stars in the observable universe.”. Data, data and more data! We’d love to hear from you.

article thumbnail

Debating SIEM in 2023, Part 2

Anton on Security

And please don’t say “because you are still SIEM-less” or “because you didn’t buy it in 2003, 2013, 2020, etc.” However, in this blog I am exploring why a particular toolset — SIEM — has a place in today’s security arsenal so I am being inherently tool-centric, not problem-centric.) So let’s dive into this!

article thumbnail

Group-IB Thwarts Chinese Tonto Team Cyberattack

SecureWorld News

Despite Tonto Team being known for its sophisticated techniques and ability to evade detection, Group-IB was able to detect and block the attack before any damage could be done. The threat actor has been targeting government, military, energy, financial, educational, healthcare, and technology sector companies since 2009.

article thumbnail

Phishing scheme shows CEOs may be ‘most valuable asset,’ and ‘greatest vulnerability’

SC Magazine

In a blog post on Monday, researchers from Trend Micro reported that they uncovered 70 email addresses that have been targeted with the so-called “Office 365 V4 phishing kit” since May 2020, 40 of which belong to “CEOs, directors, owners and founders, among other enterprise employee[s].”.

Phishing 118
article thumbnail

RSAC insights: Deploying SOAR, XDR along with better threat intel stiffens network defense

The Last Watchdog

It was by happenstance that analysts at FireEye, a leading supplier of intrusion detection systems, stumbled into a copy of the Sunburst Trojan ever-so-stealthily embedded in FireEye’s own copy of SolarWinds’ Orion network management software. The SolarWinds hack provided a chance to assess how far SOAR technology has come.