article thumbnail

Cloud Security Podcast by Google?—?Popular Episodes by Topic

Anton on Security

Top 5 overall “Confidentially Speaking“ “Data Security in the Cloud“ “Zero Trust: Fast Forward from 2010 to 2021“ “The Mysteries of Detection Engineering: Revealed! “ “Modern Threat Detection at Google“ Security Operations Center (SOC) “SOC in a Large, Complex and Evolving Organization” “EP58 SOC is Not Dead: How to Grow and Develop Your SOC for Cloud” (..)

article thumbnail

GUEST ESSAY: Cisco-Splunk merger will boost Snowflake – here’s how security teams can benefit.

The Last Watchdog

Splunk’s inability to migrate to a modern cloud-native architecture makes it difficult to take advantage of these cost-saving benefits or implement advanced data science use cases critical for threat detection. Impactful analysis A decoupled, purpose-built threat detection platform can work across distributed data lake architectures.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Anton’s Security Blog Quarterly Q3 2023

Anton on Security

“New Paper: “Future of the SOC: SOC People — Skills, Not Tiers” ” “Revisiting the Visibility Triad for 2020” “A SOC Tried To Detect Threats in the Cloud … You Won’t Believe What Happened Next” “Why is Threat Detection Hard?” Why Is Threat Detection Hard?” Use Cloud Securely? What Does This Even Mean?!” “How

article thumbnail

Cloud Security Podcast by Google?—?Popular Episodes by Topic

Security Boulevard

“The Mysteries of Detection Engineering: Revealed! “. Modern Threat Detection at Google“. Threat detection (top 5). The Mysteries of Detection Engineering: Revealed! “The The Mysteries of Detection Engineering: Revealed! “. Modern Threat Detection at Google“.

article thumbnail

Tackling Cyber Threats: Is AI Cybersecurity Our Only Hope?

Jane Frankland

If the data it is trained on is biased or incomplete, it can lead to inaccurate threat detection and response which can have severe consequences. AI can also be vulnerable to adversarial attacks, where hackers purposely manipulate the data to trick the system into making incorrect decisions and misclassifying threats.

article thumbnail

News alert: Lumifi seeking to acquire MDR cybersecurity firms to accelerate growth

The Last Watchdog

Recognized as a top-tier Security Orchestration Automation and Response (SOAR) solution, ShieldVision™ stands out in threat detection, with proactive hunting, and immediate automated interventions.

article thumbnail

Presenting the Security Outcomes Study, Volume 2

Cisco Security

For example , Accurate Threat Detection was one of our top drivers , but what technologies, processes, and staffing models help achieve success in this arena ? What about insourcing or outsourcing threat management? . Figure 2: Effect of staffing models on perceived threat detection and incident response capabilities.