Stop Trying to Take Humans Out of SOC … Except … Wait… Wait… Wait…

Stop Trying to Take Humans Out of SOC … Except … Wait… Wait… Wait…

Stop Trying to Take Humans Out of SOC … Except … Wait… Wait… Wait…This is about the Security Operations Center (SOC). And automation. And of course SOC automation.Let’s start from a dead-obvious point: you cannot and should not automate away all people from your SOC today. Or, as my esteemed colleague said, “Stop ... Read More
From Google Cloud Blog: “New Cloud Security Podcast by Google is here”

From Google Cloud Blog: “New Cloud Security Podcast by Google is here”

Those who follow me on social media already knows this, but we have launched THE Cloud Security Podcast.TL;DR:Find this on Google Podcasts, Apple Podcasts, Spotify, Stitcher and wherever else podcasts can be found. You can also download the episodes directly here. Follow @CloudSecPodcast.The whole story from our GCP blog is cross-posted ... Read More
SOC Threat Coverage Analysis — Why/How?

SOC Threat Coverage Analysis — Why/How?

| | SOC, threat detection
SOC Threat Coverage Analysis — Why/How?As I mentioned in Detection Coverage and Detection-in-Depth, the topic of threat detection coverage has long fascinated me. Back in my analyst days, we looked at it as a part of a security use case lifecycle process. For example, we focused on things like number and quality ... Read More
From Google Cloud Blog: “New whitepaper: Designing and deploying a data security strategy with…

From Google Cloud Blog: “New whitepaper: Designing and deploying a data security strategy with…

From Google Cloud Blog: “New whitepaper: Designing and deploying a data security strategy with Google Cloud”Here is another very fun resource we created (jointly with Andrew Lance from Sidechain), a paper on designing and running data security strategy on Google Cloud.Read our launch blog here — a long excerpt is quoted below.Read Sidechain blog here — look ... Read More
Role of Context in Threat Detection

Role of Context in Threat Detection

I got into a very insightful debate with somebody who will remain nameless in the beginning of this post, but will perhaps be revealed later. The debate focused on the role of context in threat detection.Specifically, it is about the role of local context (environment knowledge, organization context, site details, ... Read More
New Paper: “Future of the SOC: SOC People — Skills, Not Tiers”

New Paper: “Future of the SOC: SOC People — Skills, Not Tiers”

| | security operations, SOC
New Paper: “Future of the SOC: SOC People — Skills, Not Tiers”Back in August, we released our first Google/Chronicle — Deloitte Security Operations Center (SOC) paper titled “Future of the SOC: Forces shaping modern security operations” (launch blog, paper PDF) and promised a series of three more papers covering SOC people, process and technology.Here is ... Read More
Google Data Center Security: 6 Layers Deep

Cloud Migration Security Woes

As I hear of organizations dealing with security when migrating to the cloud, I occasionally observe cases of “extreme lift and shift.” I use this label to describe a case when an organization wants to keep every single security technology that they use on-premise after they move to the public ... Read More
Usage Scenarios for Externalized Trust

Usage Scenarios for Externalized Trust

As we discussed in “The Cloud trust paradox: To trust cloud computing more, you need the ability to trust it less”, there are situations where the encryption key really does belong off the cloud and so trust is externalized. While we argue that these are rarer than some assume, they ... Read More
Anton’s Security Blog Quarterly Q3.5 2020

Anton’s Security Blog Quarterly Q3.5 2020

Sometimes great old blog posts are hard to find (especially on Medium), so I decided to do a periodic (who am I kidding, occasional — not periodic) list blog with my favorite posts of the past quarter or so.Here is my first. The posts below are ranked by lifetime views and topic. It ... Read More
Hearing from CISOs at Google Cloud and Beyond

Hearing from CISOs at Google Cloud and Beyond

Security continues to be a top concern for cloud customers, and therefore continues to be a driver of our business at Google Cloud. However, specific security priorities vary wildly by vertical, by organization size, and by many other factors.In fact, many “CISO priorities lists” are floating out there online and many ... Read More