article thumbnail

Who Does What In Cloud Threat Detection?

Anton on Security

This post is a somewhat random exploration of the cloud shared responsibility model relationship to cloud threat detection. Funny enough, some popular shared responsibility model visuals don’t even include detection, response or security operations. Related blogs: “Why is Threat Detection Hard?” “On

article thumbnail

A Clear and Present Need: Bolster Your Identity Security with Threat Detection and Response

Duo's Security Blog

This changes how we think about buying. ” - Financial Services Customer All this points to a clear and present need for a defense-in-depth approach to mitigate breaches due to weak identity security posture. “We’re increasingly aware of high-profile attacks that have gone through the authentication layer.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why is Threat Detection Hard?

Anton on Security

While creating a recent presentation, I needed a slide on “threat detection is hard.” And it got me thinking, why is threat detection so hard for so many organizations today? This means we are “celebrating” ~35 years of cyber threat detection. This does make detection even harder. Action items?

article thumbnail

Anton’s Security Blog Quarterly Q1 2025

Anton on Security

Detection Engineering is Painfuland It Shouldnt Be (Part1) NEW Antons Alert Fatigue: TheStudy Revisiting the Visibility Triad for 2020 (update for 2025 is comingsoon) Beware: Clown-grade SOCs StillAbound Why is Threat Detection Hard? How to Make Threat Detection Better? officially!) Use Cloud Securely?

article thumbnail

Presenting the Security Outcomes Study, Volume 2

Cisco Security

For example , Accurate Threat Detection was one of our top drivers , but what technologies, processes, and staffing models help achieve success in this arena ? What about insourcing or outsourcing threat management? . Figure 2: Effect of staffing models on perceived threat detection and incident response capabilities.

article thumbnail

15+ Years of Loading Threat Intel into SIEM: Why Does This Still Suck?

Anton on Security

Specifically, how can we detect better usingTI? Before we get to the current answer, let me present my 2019 answer: Detecting Threats by Matching Threat Intel to LogsOh Really? How to make real work closer to the perfectworld? What can we do to make TI work better inside yourSIEM? Jul 2019).

article thumbnail

Augmenting Legacy Controls with AI-driven Threat Detection and Response

Security Boulevard

As organizations grapple with the limitations of legacy security controls in the face of increasingly sophisticated cyber threats, integrating AI-driven threat detection and response capabilities presents a compelling opportunity to bolster their defenses.