Stop Trying to Take Humans Out of SOC … Except … Wait… Wait… Wait…

Stop Trying to Take Humans Out of SOC … Except … Wait… Wait… Wait…
This is about the Security Operations Center (SOC). And automation. And of course SOC automation.
Let’s start from a dead-obvious point: you cannot and should not automate away all peop… Continue reading Stop Trying to Take Humans Out of SOC … Except … Wait… Wait… Wait…

From Google Cloud Blog: “New Cloud Security Podcast by Google is here”

Those who follow me on social media already knows this, but we have launched THE Cloud Security Podcast.
TL;DR:
Find this on Google Podcasts, Apple Podcasts, Spotify, Stitcher and wherever else podcasts can be found. You can also download the episodes … Continue reading From Google Cloud Blog: “New Cloud Security Podcast by Google is here”

From Google Cloud Blog: “New whitepaper: Designing and deploying a data security strategy with…

From Google Cloud Blog: “New whitepaper: Designing and deploying a data security strategy with Google Cloud”
Here is another very fun resource we created (jointly with Andrew Lance from Sidechain), a paper on designing and running data security strateg… Continue reading From Google Cloud Blog: “New whitepaper: Designing and deploying a data security strategy with…

New Paper: “Future of the SOC: SOC People — Skills, Not Tiers”

New Paper: “Future of the SOC: SOC People — Skills, Not Tiers”
Back in August, we released our first Google/Chronicle — Deloitte Security Operations Center (SOC) paper titled “Future of the SOC: Forces shaping modern security operations” (launch blog, … Continue reading New Paper: “Future of the SOC: SOC People — Skills, Not Tiers”

Usage Scenarios for Externalized Trust

As we discussed in “The Cloud trust paradox: To trust cloud computing more, you need the ability to trust it less”, there are situations where the encryption key really does belong off the cloud and so trust is externalized. While we argue that these a… Continue reading Usage Scenarios for Externalized Trust