Anton’s Security Blog Quarterly Q1 2023
Great blog posts are sometimes hard to find (especially on Medium), so I decided to do a periodic list blog with my favorite posts of the past quarter or so.
Here is the next one. The posts below are ranked by lifetime views. This covers both Anton on Security and my posts from Google Cloud blog, and our Cloud Security Podcast too (subscribe).
Top 5 most popular posts of all times (these ended up being the same as last quarter):
- “Security Correlation Then and Now: A Sad Truth About SIEM”
- “Can We Have “Detection as Code”?”
- “New Paper: “Future of the SOC: SOC People — Skills, Not Tiers””
- “Revisiting the Visibility Triad for 2020”
- “New Paper: “Future of the SOC: Forces shaping modern security operations””
Top 5 posts with the most Medium fans (these are also the same as last quarter):
- “Security Correlation Then and Now: A Sad Truth About SIEM”
- “Beware: Clown-grade SOCs Still Abound”
- “Can We Have “Detection as Code”?”
- “Why Is Threat Detection Hard?”
- “Stop Trying to Take Humans Out of SOC … Except … Wait… Wait… Wait…”
Top 5 Cloud Security Podcast by Google episodes:
- Episode 1“Confidentially Speaking”
- Episode 2 “Data Security in the Cloud”
- EP47 “Megatrends, Macro-changes, Microservices, Oh My! Changes in 2022 and Beyond in Cloud Security”
- EP75 How We Scale Detection and Response at Google: Automation, Metrics, Toil
- Zero Trust: Fast Forward from 2010 to 2021
Now, fun posts by topic.
Security operations / detection & response:
- “Security Correlation Then and Now: A Sad Truth About SIEM”
- “Achieving Autonomic Security Operations: Why metrics matter (but not how you think)” [GCP blog]
- “Can We Have “Detection as Code”?”
- “New Paper: “Future of the SOC: SOC People — Skills, Not Tiers””
- “New Paper: “Future of the SOC: Forces shaping modern security operations””
- “Beware: Clown-grade SOCs Still Abound”
- “Revisiting the Visibility Triad for 2020”
- “Stop Trying to Take Humans Out of SOC … Except … Wait… Wait… Wait…”
- “Why is Threat Detection Hard?”
- “A SOC Tried To Detect Threats in the Cloud … You Won’t Believe What Happened Next”
- ”Top 10 SIEM Log Sources in Real Life?”
Data security:
- “How autonomic data security can help define cloud’s future” [GCP blog]
- “New whitepaper: Designing and deploying a data security strategy with Google Cloud” [GCP Blog]
- “The cloud trust paradox: To trust cloud computing more, you need the ability to trust it less” [GCP Blog]
- “The cloud trust paradox: 3 scenarios where keeping encryption keys off the cloud may be necessary” [GCP Blog]
- “Best kept security secrets: How Cloud EKM can help resolve the cloud trust paradox” [GCP blog]
- “Data Security and Threat Models”
- “Lost in translation: encryption, key management, and real security” [GCP Blog]
- “Musings on Modern Data Security”
- “Improving security, compliance, and governance with cloud-based DLP data discovery” [GCP Blog]
- “Transform data to secure it: Use Cloud DLP” [GCP Blog]
- “Not just compliance: reimagining DLP for today’s cloud-centric world” [GCP Blog]
Cloud security:
- “How CISOs need to adapt their mental models for cloud security” [GCP blog]
- “How to think about threat detection in the cloud” [GCP blog]
- “Use Cloud Securely? What Does This Even Mean?!”
- “Who Does What In Cloud Threat Detection?”
- “A SOC Tried To Detect Threats in the Cloud … You Won’t Believe What Happened Next”
- “Cloud Migration Security Woes”
- “Move to Cloud: A Chance to Finally Transform Security?”
- “Is Your Fate In the Cloud?”
Enjoy!
Previous posts in this series:
- Anton’s Security Blog Quarterly Q4 2022
- Anton’s Security Blog Quarterly Q3 2022
- Anton’s Security Blog Quarterly Q2 2022
- Anton’s Security Blog Quarterly Q1 2022
- Anton’s Security Blog Quarterly Q4 2021
- Anton’s Security Blog Quarterly Q3 2021
- Anton’s Security Blog Quarterly Q2 2021
- Anton’s Security Blog Quarterly Q1 2021
- Anton’s Security Blog Quarterly Q3.5 2020
Anton’s Security Blog Quarterly Q1 2023 was originally published in Anton on Security on Medium, where people are continuing the conversation by highlighting and responding to this story.
*** This is a Security Bloggers Network syndicated blog from Stories by Anton Chuvakin on Medium authored by Anton Chuvakin. Read the original post at: https://medium.com/anton-on-security/antons-security-blog-quarterly-q1-2023-5c378b8ce5c9?source=rss-11065c9e943e------2