Remove Blog Remove Government Remove Technology Remove Threat Detection
article thumbnail

Anton’s Security Blog Quarterly Q4 2021

Security Boulevard

Sometimes great old blog posts are hard to find (especially on Medium ) , so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast too ( subscribe ). “Can Can We Have “Detection as Code”?”.

article thumbnail

Anton’s Security Blog Quarterly Q4 2021

Anton on Security

Sometimes great old blog posts are hard to find (especially on Medium ) , so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast too ( subscribe ). Why Is Threat Detection Hard?” “A

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How security vendors are aiding Ukraine

CSO Magazine

Since Russia launched a full-scale military invasion into Ukraine on February 23, a series of cyberattacks have been detected targeting Ukrainian businesses, websites and government agencies amid the ongoing conflict. Here is a list of the cybersecurity vendors currently known to be offering aid.

article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Here is Erin’s Q&A column, which originally went live on OneRep’s well-done blog.) For the first expert interview on our blog, we welcomed Pulitzer-winning investigative reporter Byron V. Byron: I was initially drawn to cybersecurity as a USA TODAY technology reporter assigned to cover Microsoft.

article thumbnail

GUEST ESSAY: Leveraging real-time visibility to quell persistent ‘take-a-USB-stick-home’ attacks

The Last Watchdog

Only by seeing what’s on your network, both right now and from the recent past, can you detect and respond to real-time incidents in the fastest and most comprehensive way. About the essayist: Ben Smith is Field Chief Technology Officer with NetWitness , a threat detection and response firm.

Malware 140
article thumbnail

Quantum computing brings new security risks: How to protect yourself

CyberSecurity Insiders

This blog was written by an independent guest blogger. Although commercial quantum computing may still be decades away, government agencies and industry experts agree that now is the time to prepare your cybersecurity landscape for the future. Implement managed threat detection. What is quantum computing? Wrapping up.

Risk 134
article thumbnail

Group-IB Thwarts Chinese Tonto Team Cyberattack

SecureWorld News

Despite Tonto Team being known for its sophisticated techniques and ability to evade detection, Group-IB was able to detect and block the attack before any damage could be done. The threat actor has been targeting government, military, energy, financial, educational, healthcare, and technology sector companies since 2009.

Phishing 101