article thumbnail

Anton’s Security Blog Quarterly Q1 2021

Security Boulevard

Why is Threat Detection Hard?”. Data security: “New whitepaper: Designing and deploying a data security strategy with Google Cloud” [GCP Blog]. “New Paper: “Future of the SOC: SOC People?—?Skills, Skills, Not Tiers””. Revisiting the Visibility Triad for 2020”. Top 10 SIEM Log Sources in Real Life?”.

article thumbnail

Establishing Security Maturity Through CIS Cyber Defense Framework

McAfee

Organizations are increasingly finding themselves caught in the “ security war of more ” where Governance, Risk and Compliance regimes, compounded by vendor solution fragmentation, have resulted in tick-box security. ePO Protection Workspace, for example, gives a single pane of glass view across your device to cloud risk and threat metrics.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

If Infosec Was a Supermarket Business

Security Boulevard

So, if we apply this to our analogy, we could class this data as low risk. However, would you react the same way if a single piece of low-risk data is affected (i.e. Carrying out these functions requires the same level of access as any other corporate location, meaning it carries the same risks to the business.

InfoSec 52
article thumbnail

Understanding MDR, XDR, EDR and TDR

Security Boulevard

A program with proper threat detection and response (TDR) has two key pillars: understanding the scope and being proactive in threat hunting. I recently had the pleasure of sitting down with Grant Naschke , cybersecurity leader and Head of Global Cyber Threat Detection, Response & Intelligence at 3M.

article thumbnail

Using AI/ML to Create Better Security Detections

Security Boulevard

If a defender makes these anomaly detections too sensitive, then they are bombarded with noise. If they make the thresholds too high, they risk missing attacks. Whitepaper: Power to the People - Democratizing Automation & AI-Driven Security. To demonstrate this, we’ll pivot to an example that isn’t a cyber security issue.