Remove Blog Remove Cloud Migration Remove Risk Remove Threat Detection
article thumbnail

Anton’s Security Blog Quarterly Q1 2021

Security Boulevard

Sometimes great old blog posts are hard to find (especially on Medium …), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. It covers both Anton on Security and my posts from Google Cloud blog [and now our Cloud Security Podcast too!]. Why is Threat Detection Hard?”.

article thumbnail

The Best Way to Detect Threats In the Cloud?

Anton on Security

Let’s continue our fun conversation on threat detection in the cloud that we started in “Who Does What In Cloud Threat Detection?” and “How to Think about Threat Detection in the Cloud” and continued somewhat in “Detection as Code? No, Detection as COOKING!” and growing?—?telemetry

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Best Way to Detect Threats In the Cloud?

Security Boulevard

Let’s continue our fun conversation on threat detection in the cloud that we started in “Who Does What In Cloud Threat Detection?” and “How to Think about Threat Detection in the Cloud” and continued somewhat in “Detection as Code? No, Detection as COOKING!” and growing?—?telemetry

article thumbnail

How better key management can close cloud security gaps troubling US government

Thales Cloud Protection & Licensing

How better key management can close cloud security gaps troubling US government madhav Thu, 02/29/2024 - 05:38 In my first blog on this topic I noted a Treasury Department report released last year listed six cloud security challenges financial sector firms face.

article thumbnail

How better key management can close cloud security gaps troubling US government

Security Boulevard

How better key management can close cloud security gaps troubling US government madhav Thu, 02/29/2024 - 05:38 In my first blog on this topic I noted a Treasury Department report released last year listed six cloud security challenges financial sector firms face.

article thumbnail

How to shift into a new approach to cybersecurity asset management

CyberSecurity Insiders

This blog was written by an independent guest blogger. Because of this, companies in all industries were faced with an array of new technologies like cloud and containers that support the shift to edge computing and remote workers. They also come in handy with shared virtual machines and movement within the cloud.

article thumbnail

Group-IB uncovers PerSwaysion – sophisticated phishing campaign targeting executives worldwide

Security Affairs

It stops any automated threat detection efforts to URLs visited by the targets. The detailed technical analysis of PerSwaysion operations and attack scheme is available in Group-IB’s blog post. Cloud based corporate services, such as MS Sway, introduce new challenges to traditional cyber risk management frameworks.