Syndicated Blog

Securosis Blog
All Securosis Blogs (blog liquidmatrix projectquant)
The THIRTEENTH Annual Disaster Recovery Breakfast: Changing of the Guard

The THIRTEENTH Annual Disaster Recovery Breakfast: Changing of the Guard

Posted under: What a long, strange trip it’s been over the last 3 years. In fact, the last time I saw many of you was at the last Disaster Recovery Breakfast in ...
Heading to Techstrong

Heading to Techstrong

Posted under: General The phone rang. On the other end, I heard a booming voice many of you are familiar with. “Hey Mikey! What’s shaking? What’s your plan now that Rich is ...

SOC 2025: Operationalizing the SOC

Posted under: Research and Analysis So far in this series, we’ve discussed the challenges of security operations, making sense of security data, and refining detection/analytics, which are all critical components of building ...
SOC 2025: Detection/Analytics

SOC 2025: Detection/Analytics

Posted under: Research and Analysis We spent the last post figuring out how to aggregate security data. Alas, a lake of security data doesn’t find attackers, so now we have to use ...
SOC 2025: Making Sense of Security Data

SOC 2025: Making Sense of Security Data

|
Posted under: Research and Analysis Intelligence comes from data. And there is no lack of security data, that’s for sure. Everything generates data. Servers, endpoints, networks, applications, databases, SaaS services, clouds, containers, ...

SOC 2025: The Coming SOC Evolution

|
Posted under: Research and Analysis It’s brutal running a security operations center (SOC) today. The attack surface continues to expand, in a lot of cases exponentially, as data moves to SaaS, applications ...

New Age Network Detection: Use Cases

Posted under: Research and Analysis As we wrap up the New Age Network Detection (NAND) series, we’ve made the point that network analysis remains critical to finding malicious activity, even as you ...

Papers Posted

Posted under: Research and Analysis It turns out that we are still writing papers and posting them in our research library, even though far less frequently than back in the day. Working ...

New Age Network Detection: Collection and Analysis

Posted under: Research and Analysis As we return to our series on New Age Network Detection, let’s revisit our first post. We argued that we’re living through technology disruption on a scale, ...

New Age Network Detection: Introduction

Posted under: Research and Analysis Like the rest of the technology stack, the enterprise network is undergoing a huge transition. With data stores increasingly in the cloud and connectivity to SaaS providers ...