Remove Cloud Migration Remove Presentation Remove Threat Detection
article thumbnail

Who Does What In Cloud Threat Detection?

Anton on Security

This post is a somewhat random exploration of the cloud shared responsibility model relationship to cloud threat detection. Funny enough, some popular shared responsibility model visuals don’t even include detection, response or security operations. Related blogs: “Why is Threat Detection Hard?” “On

article thumbnail

Anton’s Security Blog Quarterly Q1 2025

Anton on Security

Detection Engineering is Painfuland It Shouldnt Be (Part1) NEW Antons Alert Fatigue: TheStudy Revisiting the Visibility Triad for 2020 (update for 2025 is comingsoon) Beware: Clown-grade SOCs StillAbound Why is Threat Detection Hard? How to Make Threat Detection Better? Use Cloud Securely? officially!)

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Who Does What In Cloud Threat Detection?

Security Boulevard

This post is a somewhat random exploration of the cloud shared responsibility model relationship to cloud threat detection. Funny enough, some popular shared responsibility model visuals don’t even include detection, response or security operations. Anton’s Cloud Threat Detection Table.

article thumbnail

NEW TECH: Trend Micro flattens cyber risks — from software development to deployment

The Last Watchdog

Long before this awful pandemic hit us, cloud migration had attained strong momentum in the corporate sector. As Covid19 rages on, thousands of large to mid-sized enterprises are now slamming pedal to the metal on projects to switch over to cloud-based IT infrastructure.

article thumbnail

Group-IB uncovers PerSwaysion – sophisticated phishing campaign targeting executives worldwide

Security Affairs

One of the defining signatures of PerSwaysion is that it spreads like wildfire jumping from one victim to another while no malware is present on a user device during the attack. The attackers pick legitimate cloud-based content sharing services, such as Microsoft Sway, Microsoft SharePoint, and OneNote to avoid traffic detection.

Phishing 138
article thumbnail

Anton’s Security Blog Quarterly Q1 2025

Security Boulevard

Detection Engineering is Painfuland It Shouldnt Be (Part1) NEW Antons Alert Fatigue: TheStudy Revisiting the Visibility Triad for 2020 (update for 2025 is comingsoon) Beware: Clown-grade SOCs StillAbound Why is Threat Detection Hard? How to Make Threat Detection Better? Use Cloud Securely? officially!)

article thumbnail

Types of Cloud Security Controls & Their Uses

eSecurity Planet

Understanding the various controls, their applications, benefits, and associated risks will help you gain full, secure operations during and after cloud migration. Employ Security Automation Practices Security automation makes threat detection and mitigation more efficient.

Risk 106