article thumbnail

How to Think about Threat Detection in the Cloud

Anton on Security

This is written jointly with Tim Peacock and will eventually appear on the GCP blog. In this post, we will share our views on a foundational framework for thinking about threat detection in public cloud computing. To start, let’s remind our audience what we mean by threat detection and detection and response.

article thumbnail

Who Does What In Cloud Threat Detection?

Anton on Security

This post is a somewhat random exploration of the cloud shared responsibility model relationship to cloud threat detection. Funny enough, some popular shared responsibility model visuals don’t even include detection, response or security operations. Related blogs: “Why is Threat Detection Hard?” “On

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Complete Guide to OT Threat Detection and Response

Security Boulevard

In Operational Technology (OT), where the physical world converges with the digital, the demand for vigilant attention to threat detection and response is of the greatest significance. This blog will help […] The post Complete Guide to OT Threat Detection and Response appeared first on Security Boulevard.

article thumbnail

Threat Detection and Response (TDR) – An Overview

Heimadal Security

Threat detection and response (TDR) is an increasingly important approach to security as organizations struggle to keep up with the growing number of cyberattacks. TDR combines several technologies and processes to detect, analyze, and respond to malicious activity on networks, devices, applications, and more.

article thumbnail

Role of Context in Threat Detection

Anton on Security

The debate focused on the role of context in threat detection. Specifically, it is about the role of local context (environment knowledge, organization context, site details, etc) in threat detection. Can threat detection work well without such local context? Now, some of you will say “yes, of course!”

article thumbnail

Stay on target: How accurate threat detection leads to better defense

Cisco Security

Here, in part four of our five-part blog series , we’ll be focusing on that very question. People, processes, and technology: The cybersecurity trinity. First off, we need to puzzle out how we gain accurate threat detection. Had the Empire known of the threats the Rebels posed, they could have mounted a stronger defense.

article thumbnail

Threat detection with network metadata vs. DPI

Security Boulevard

Traditional DPI-based network threat detection appliances will have a role to play in your technology stack for a while. The post Threat detection with network metadata vs. DPI appeared first on Netography. The post Threat detection with network metadata vs. DPI appeared first on Security Boulevard.