How to Think about Threat Detection in the Cloud

Anton on Security

In this post, we will share our views on a foundational framework for thinking about threat detection in public cloud computing. To start, let’s remind our audience what we mean by threat detection and detection and response.

Who Does What In Cloud Threat Detection?

Anton on Security

This post is a somewhat random exploration of the cloud shared responsibility model relationship to cloud threat detection. Funny enough, some popular shared responsibility model visuals don’t even include detection, response or security operations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

The future of email threat detection

CyberSecurity Insiders

There is more need to understand the threats than ever before, as the threat surface area increases, and tactics increase. This results in pursuing solutions that accelerate detection and response while increasing operational efficiencies. Threat protection in 2022 and beyond.

On Threat Detection Uncertainty

Anton on Security

My post “Why is Threat Detection Hard?” In this post, I wanted to explore a seemingly obvious, while surprisingly fascinating aspect of detection: uncertainty. Let’s start our journey with exploring the classic fallacy, “if you can detect [the threat], why can’t you prevent it?”

"Insider Threat" Detection Software

Schneier on Security

Notice this bit from an article on the arrest of Christopher Hasson: It was only after Hasson's arrest last Friday at his workplace that the chilling plans prosecutors assert he was crafting became apparent, detected by an internal Coast Guard program that watches for any "insider threat." Any detection system of this kind is going to have to balance false positives with false negatives.

Threat Detection and Response

Security Boulevard

Seceon use the most advanced artificial intelligence for the technology required for threat detection. The post Threat Detection and Response appeared first on Seceon. The post Threat Detection and Response appeared first on Security Boulevard.

Real-Time Threat Detection in the Cloud

Security Boulevard

We know bad actors are out there; if you’re operating in the cloud, how are you detecting threats? The post Real-Time Threat Detection in the Cloud appeared first on Security Boulevard.

Why is Threat Detection Hard?

Anton on Security

While creating a recent presentation, I needed a slide on “threat detection is hard.” And it got me thinking, why is threat detection so hard for so many organizations today? This means we are “celebrating” ~35 years of cyber threat detection.

How to Make Threat Detection Better?

Anton on Security

why are we still bad at detecting threats? I’ve lamented on this a few times, either touching on general difficulties with detection , its uncertainty or highlighting the fragile detections people write. What does it mean to have “good” detections ?

How to Measure Threat Detection Quality for an Organization?

Anton on Security

but also don’t expect questions… So, in recent weeks, I had a few simultaneous conversations with various people that focused on the quality of threat detection. Here I’m talking about the quality of the entire detection capability of an organization. A macro-level detection quality, if you would. Some others framed it as the strength of the detection team, but I think that the focus on the team alone is not sufficient. Is this a good detection rule?

Microsoft acquires cyber threat detecting firm Miburo

CyberSecurity Insiders

Microsoft has acquired Miburo, a cyber threat detection firm that can identify and respond to foreign information operations. Already, Microsoft has been reigning in the business of tracking down cyber threats as it has committed itself to offer utmost online safety to its customers.

Understanding the Omdia Threat Detection Data Life Cycle

Dark Reading

Omdia's threat detection data life cycle highlights the considerations for effective data-driven threat detection Data quality is key in an effective TDIR solution.

How to Think about Threat Detection in the Cloud

Security Boulevard

In this post, we will share our views on a foundational framework for thinking about threat detection in public cloud computing. To start, let’s remind our audience what we mean by threat detection and detection and response. Detection methods change.

API Threat Detection: Staying Safe Over Time: Part 2

Security Boulevard

The post API Threat Detection: Staying Safe Over Time: Part 2 appeared first on Cequence Security. The post API Threat Detection: Staying Safe Over Time: Part 2 appeared first on Security Boulevard.

Ransomware: A Beginner’s Guide to Threat Detection

Tech Republic Security

The post Ransomware: A Beginner’s Guide to Threat Detection appeared first on TechRepublic. If you have been following the news, you’ll have most certainly been bombarded by the term ransomware.

Role of Context in Threat Detection

Anton on Security

The debate focused on the role of context in threat detection. Specifically, it is about the role of local context (environment knowledge, organization context, site details, etc) in threat detection. Can threat detection work well without such local context? Note that for this discussion it does not matter that anti-malware will detect and then block (“prevent”) the threat (in other discussions, it definitely does ).

Who Does What In Cloud Threat Detection?

Security Boulevard

This post is a somewhat random exploration of the cloud shared responsibility model relationship to cloud threat detection. Funny enough, some popular shared responsibility model visuals don’t even include detection, response or security operations.

Top Threat Detections Can Identify Suspicious Activity

Security Boulevard

Another one: Microsoft is a target of threat actors. The post Top Threat Detections Can Identify Suspicious Activity appeared first on Security Boulevard. Here’s an understatement: the cloud has changed everything.

Acronis Advanced Security + EDR improves threat detection for IT teams

Security Boulevard

Acronis Advanced Security + EDR improves threat detection for IT teams. Advanced Security + EDR delivers an innovative approach to threat detection, containment and remediation by reducing the complexity present in other EDR solutions.

Google introduces Context-Aware Cyber Threat detection to Chronicle

CyberSecurity Insiders

Google Cloud has introduced a context-aware update to its Chronicle security platform that will help in detecting threats in a more efficient way. The post Google introduces Context-Aware Cyber Threat detection to Chronicle appeared first on Cybersecurity Insiders.

How to Make Threat Detection Better?

Security Boulevard

why are we still bad at detecting threats? I’ve lamented on this a few times, either touching on general difficulties with detection , its uncertainty or highlighting the fragile detections people write. Here, I want to continue the conversation on detection quality.

Improving Threat Detection Using LogRhythm SmartResponse with Lists to Monitor IOCs

Security Boulevard

As a security professional, you know all too well the need to continually improve your threat detection knowledge and skill set. The post Improving Threat Detection Using LogRhythm SmartResponse with Lists to Monitor IOCs appeared first on LogRhythm.

Accurate and Reliable Threat Detection for your Security Program

Cisco Security

It’s 11:59PM on a Sunday evening, and your phone starts alerting you to a new threat that is being actively exploited. Accurate threat detection – reliability vs liability. Accurate threat detection is a difficult subject.

Threat Detection Software: A Deep Dive

The Hacker News

As the threat landscape evolves and multiplies with more advanced attacks than ever, defending against these modern cyber threats is a monumental challenge for almost any organization. At scale, threat

The XDR Revolution: Threat Detection and Response for All!

Dark Reading

In this webinar replay, Omdia outlines the ways in which XDR facilitates faster and easier threat detection and response, and key points organizations should consider when evaluating XDR technology

Identity Threat Detection and Response Explained

Security Boulevard

In March, Gartner analysts dropped us some breadcrumbs on an emerging new category that they are calling “Identity Threat Detection and Response” (ITDR). The post Identity Threat Detection and Response Explained appeared first on Authomize.

CISA Launches New Threat Detection Dashboard

Dark Reading

Aviary is a new dashboard that works with CISA's Sparrow threat detection tool

Google updates Chronicle with enhanced threat detection

CSO Magazine

Google Cloud Wednesday announced the general availability of what it calls “curated detection” for its Chronicle security analysis platform.

Threat detection with network metadata vs. DPI

Security Boulevard

Traditional DPI-based network threat detection appliances will have a role to play in your technology stack for a while. The post Threat detection with network metadata vs. DPI appeared first on Netography.

How to Overcome Threat Detection and Response Challenges

The Security Ledger

In this Expert Insight, Jack Naglieri, the founder and CEO of Panther Labs, talks about the many challenges of enterprise-scale threat detection and response. The post How to Overcome Threat Detection and Response Challenges appeared first on The Security Ledger.

How to Measure Threat Detection Quality for an Organization?

Security Boulevard

So, in recent weeks, I had a few simultaneous conversations with various people that focused on the quality of threat detection. Here I’m talking about the quality of the entire detection capability of an organization. A macro-level detection quality, if you would.

Ansell Adopts Exabeam Fusion for Threat Detection, Investigation, and Response

CyberSecurity Insiders

The powerful combination of our cloud-scale security log management, behavioral analytics, and automated investigation experience gives security operations an unprecedented advantage over adversaries including insider threats, nation states, and other cyber criminals. FOSTER CITY, Calif.–(

The Next Generation of Threat Detection Will Require Both Human and Machine Expertise

Dark Reading

To be truly effective, threat detection and response need to combine the strengths of people and technology

Overlapping ICS/OT Mandates Distract From Threat Detection and Response

Dark Reading

It's time for regulators of critical infrastructure — including industrial control systems and operational technology — to focus more on operational resiliency

deepwatch Adds Managed Threat Detection via Splunk

Security Boulevard

Managed security service provider deepwatch this week announced it has added a threat detection and response service based on the security information and event management (SIEM) platform created by Splunk.

Google Cloud Debuts Threat-Detection Service

Dark Reading

Lockdown economics are driving a threat-intelligence business boom. Chronicle Detect is Google's answer to monitoring so much log data created by the distributed workforce

Microsoft to acquire Cyber Threat detection business RiskIQ

CyberSecurity Insiders

Microsoft, the Tech giant from America has made it official that it is planning to acquire Cloud based Cyber Threat Detection offering business RiskIQ for an undisclosed amount.

Datto acquires BitDam to boost its cyber threat detection business

CyberSecurity Insiders

BitDam offers Advanced Threat Protection (ATP) solution that enables customers to protect their IT infrastructure against malware, phishing and ransomware. The post Datto acquires BitDam to boost its cyber threat detection business appeared first on Cybersecurity Insiders.

XDR: The Next Step in Threat Detection and Response

Security Boulevard

The global EDR market (Endpoint Detection and Response) is growing rapidly. The post XDR: The Next Step in Threat Detection and Response appeared first on Security Boulevard.

A Key Initiative in 2022 is Improving Threat Detection and Response

Security Boulevard

One of my top cybersecurity initiatives for 2022 is improving threat detection and response. The post A Key Initiative in 2022 is Improving Threat Detection and Response appeared first on Gurucul.

Simplified Security with Purpose-Built Networking for Advanced Threat Detection

Cisco Retail

And do you ever wonder if any threats are lurking within? Of course you have; we all know that threats are everywhere and can be anywhere within our network at any point in time. Have you ever looked at your switch and wondered what is going on inside there?

Lumu Raises $7.5M to Advance Threat Detection

Security Boulevard

to Advance Threat Detection appeared first on Security Boulevard. Lumu announced today it has raised an additional $7.5 million to fuel adoption of a cloud-based platform that employs machine learning algorithms to surface the highest priority security alerts in real-time.

HYAS brings security threat detection, response to production networks

CSO Magazine

Bringing threat detection and response capabilities to production networks, cybersecurity company HYAS Infosec is set to release a new, specifically targeted security solution dubbed HYAS Confront.