article thumbnail

How to Think about Threat Detection in the Cloud

Anton on Security

This is written jointly with Tim Peacock and will eventually appear on the GCP blog. In this post, we will share our views on a foundational framework for thinking about threat detection in public cloud computing. To start, let’s remind our audience what we mean by threat detection and detection and response.

article thumbnail

Synergizing Advanced Identity Threat Detection & Response Solutions

Cisco Security

With the proliferation of sophisticated cyber threats, businesses must adopt a multi-layered… Read more on Cisco Blogs Explore the synergy of Cisco's Duo Security & Identity Intelligence, bolstering cyber defense with advanced threat detection & response capabilities

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Anton’s Security Blog Quarterly Q4 2022

Anton on Security

Great blog posts are sometimes hard to find (especially on Medium ), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast too ( subscribe ). Why Is Threat Detection Hard?”

article thumbnail

How to Measure Threat Detection Quality for an Organization?

Anton on Security

Sometimes I write blog posts with answers. In other cases, I write blog posts with questions. This particular blog post covers a topic where I feel I am in the “discovering questions” phase. Here I’m talking about the quality of the entire detection capability of an organization. In other words, don’t expect answers?—?but

article thumbnail

Rethinking Identity Threat Detection: Don’t Rely on IP Geolocation

Security Boulevard

However, with the changing threat landscape, relying solely on this information is no longer sufficient. The post Rethinking Identity Threat Detection: Don’t Rely on IP Geolocation appeared first on Security Boulevard.

article thumbnail

Who Does What In Cloud Threat Detection?

Anton on Security

This post is a somewhat random exploration of the cloud shared responsibility model relationship to cloud threat detection. Funny enough, some popular shared responsibility model visuals don’t even include detection, response or security operations. Related blogs: “Why is Threat Detection Hard?” “On

article thumbnail

Anton’s Security Blog Quarterly Q3 2023

Anton on Security

Great blog posts are sometimes hard to find (especially on Medium ), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast too ( subscribe ). Why Is Threat Detection Hard?”