article thumbnail

Who Does What In Cloud Threat Detection?

Anton on Security

This post is a somewhat random exploration of the cloud shared responsibility model relationship to cloud threat detection. Funny enough, some popular shared responsibility model visuals don’t even include detection, response or security operations. Related blogs: “Why is Threat Detection Hard?” “On

article thumbnail

Cloud Security Podcast by Google?—?Popular Episodes by Topic

Anton on Security

Top 5 overall “Confidentially Speaking“ “Data Security in the Cloud“ “Zero Trust: Fast Forward from 2010 to 2021“ “The Mysteries of Detection Engineering: Revealed! “ “Modern Threat Detection at Google“ Security Operations Center (SOC) “SOC in a Large, Complex and Evolving Organization” “EP58 SOC is Not Dead: How to Grow and Develop Your SOC for Cloud” (..)

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Who Does What In Cloud Threat Detection?

Security Boulevard

This post is a somewhat random exploration of the cloud shared responsibility model relationship to cloud threat detection. Funny enough, some popular shared responsibility model visuals don’t even include detection, response or security operations. Anton’s Cloud Threat Detection Table.

article thumbnail

Cloud Security Podcast by Google?—?Popular Episodes by Topic

Security Boulevard

“The Mysteries of Detection Engineering: Revealed! “. Modern Threat Detection at Google“. EP58 SOC is Not Dead: How to Grow and Develop Your SOC for Cloud”. Threat detection (top 5). The Mysteries of Detection Engineering: Revealed! “The Modern Threat Detection at Google“.

article thumbnail

Anton’s Security Blog Quarterly Q3 2023

Anton on Security

“New Paper: “Future of the SOC: SOC People — Skills, Not Tiers” ” “Revisiting the Visibility Triad for 2020” “A SOC Tried To Detect Threats in the Cloud … You Won’t Believe What Happened Next” “Why is Threat Detection Hard?” Why Is Threat Detection Hard?” Is Your Fate In the Cloud?”

article thumbnail

Anton’s Security Blog Quarterly Q1 2022

Anton on Security

“Why Is Threat Detection Hard?” “A Episode 17 “Modern Threat Detection at Google” Random fun new posts: “Anton and The Great XDR Debate, Part 3” “Left of SIEM? Security operations / detection & response: “Security Correlation Then and Now: A Sad Truth About SIEM” “Can We Have “Detection as Code”?”

article thumbnail

Menlo Security Finds Cloud Migration and Remote Work Gives Rise to New Era of Malware, Highly Evasive Adaptive Threats (HEAT)

CyberSecurity Insiders

HEAT attacks leverage one or more of the following core techniques that bypass legacy network security defenses: Evades Both Static and Dynamic Content Inspection: HEAT attacks evade both signature and behavioral analysis engines to deliver malicious payloads to the victim using innovative techniques such as HTML Smuggling.