article thumbnail

Anton’s Security Blog Quarterly Q2 2025

Anton on Security

“Use Cloud Securely? How CISOs need to adapt their mental models for cloud security” [GCP blog] “Who Does What In Cloud Threat Detection?” Cloud Migration Security Woes” “Move to Cloud: A Chance to Finally Transform Security?” What Does This Even Mean?!” “How It’s a multicloud jungle out there.

article thumbnail

Anton’s Security Blog Quarterly Q3 2024

Anton on Security

Revisiting the Visibility Triad for 2020 (update for 2024 is coming soon BTW!) Security operations / detection & response: “Security Correlation Then and Now: A Sad Truth About SIEM” Migrate Off That Old SIEM Already! “Does the World Need Cloud Detection and Response (CDR)?” “Use Use Cloud Securely?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2024 Cybersecurity Industry Experts Predictions: Part 1

IT Security Guru

Mike Newman, CEO of My1Login: Cloud migration will expand the attack surface “In the last year organisations have continued to transform by moving more of their applications and data into the cloud. AI will dominate the cyber landscape in 2024 in ways few people can imagine.

article thumbnail

Anton’s Security Blog Quarterly Q1 2025

Anton on Security

Does the World Need Cloud Detection and Response(CDR)? Use Cloud Securely? How CISOs need to adapt their mental models for cloud security [GCPblog] Who Does What In Cloud Threat Detection? Cloud Migration SecurityWoes Move to Cloud: A Chance to Finally Transform Security? What Does This EvenMean?!

article thumbnail

Fifteen Best Practices to Navigate the Data Sovereignty Waters

Thales Cloud Protection & Licensing

Understand the Nature of Data in Cloud Migration As noted, to meet data sovereignty requirements, organizations will often have to set up cloud data centers in multiple jurisdictions and, as such, carry out cloud migration.

article thumbnail

Fifteen Best Practices to Navigate the Data Sovereignty Waters

Security Boulevard

Understand the Nature of Data in Cloud Migration As noted, to meet data sovereignty requirements, organizations will often have to set up cloud data centers in multiple jurisdictions and, as such, carry out cloud migration.

article thumbnail

5 Cyber Trends to Expect in 2024

NetSpi Executives

As we look toward 2024, some aspects will remain the same, such as persistent ransomware and cloud-based attacks, as well as AI creating a larger attack vector for cybercriminals. In 2024, IT teams will look to turn this around and keep pace with the technical skills needed to secure digital transformations.