Remove Blog Remove Technology Remove Threat Detection
article thumbnail

Anton’s Security Blog Quarterly Q4 2021

Anton on Security

Sometimes great old blog posts are hard to find (especially on Medium ) , so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast too ( subscribe ). Why Is Threat Detection Hard?” “A

article thumbnail

Who Does What In Cloud Threat Detection?

Anton on Security

This post is a somewhat random exploration of the cloud shared responsibility model relationship to cloud threat detection. Funny enough, some popular shared responsibility model visuals don’t even include detection, response or security operations. Related blogs: “Why is Threat Detection Hard?” “On

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY — How threat detection services for SMBs are continuing to evolve and improve

The Last Watchdog

Hence, using a threat prevention and detection solution that doesn’t disrupt day-to-day operations while providing early warning and stopping potential threats before they escalate is essential. Moreover, one of the most important trends in threat detection is the move toward artificial intelligence (AI).

article thumbnail

SOC Technology Failures?—?Do They Matter?

Anton on Security

SOC Technology Failures?—?Do img src: [link] Most failed Security Operations Centers (SOCs) that I’ve seen have not failed due to a technology failure. Hence this blog was born. Let’s stick to mostly technology focused failures. SOC should not spend time / resources managing such technologies. Do They Matter?

article thumbnail

Best 10 SOC Tools for Security Operations and Threat Detection

Centraleyes

In this blog, we set out to review the top 10 SOC platforms shaping modern operations and examine the factors that determine whether an organization should build an in-house SOC or opt for a managed solution. Reviews emphasize its ability to streamline threat detection and incident response while integrating compliance tools seamlessly.

article thumbnail

Threat Detection and Response (TDR) – An Overview

Heimadal Security

Threat detection and response (TDR) is an increasingly important approach to security as organizations struggle to keep up with the growing number of cyberattacks. TDR combines several technologies and processes to detect, analyze, and respond to malicious activity on networks, devices, applications, and more.

article thumbnail

Does the World Need Cloud Detection and Response (CDR)?

Anton on Security

Second, a hypothetical CDR tool will need to do its own threat detection, enable the analysts to triage alerts, support incident investigative workflows and probably do some response automation too. As you can see, I stole some ideas from my original EDR definition so that some useful similarities come out. Should it exist as a market?