Anton’s Security Blog Quarterly Q3.5 2020

Sometimes great old blog posts are hard to find (especially on Medium), so I decided to do a periodic (who am I kidding, occasional — not periodic) list blog with my favorite posts of the past quarter or so.
Here is my first. The posts below are ranked… Continue reading Anton’s Security Blog Quarterly Q3.5 2020

Hearing from CISOs at Google Cloud and Beyond

Security continues to be a top concern for cloud customers, and therefore continues to be a driver of our business at Google Cloud. However, specific security priorities vary wildly by vertical, by organization size, and by many other factors.
In fact,… Continue reading Hearing from CISOs at Google Cloud and Beyond

From Google Cloud Blog: “Improving security, compliance, and governance with cloud-based DLP data…

From Google Cloud Blog: “Improving security, compliance, and governance with cloud-based DLP data discovery”
So, I’ve been doing some blogging at Google Cloud blog with most posts connected to products, launches, etc. However, I am also doing a fun blo… Continue reading From Google Cloud Blog: “Improving security, compliance, and governance with cloud-based DLP data…

Posts From Beyond The Grave: How To Impress / Annoy An Analyst During A Briefing

My old $employer blog has vanished and a lot of content of value to the community went down with it. Naturally, I do not own the IP and I cannot go to archive.org and bring it back to life.
However, I will make an exception for this post. Because it (a… Continue reading Posts From Beyond The Grave: How To Impress / Annoy An Analyst During A Briefing

Can We Have “Detection as Code”?

One more idea that has been bugging me for years is an idea of “detection as code.” Why is it bugging me and why should anybody else care?
First, is “detection as code” just a glamorous term for what you did when you loaded your Snort rules in cvs in, … Continue reading Can We Have “Detection as Code”?

Back in 2015, while working on a Gartner SOC paper, I coined the concept of “SOC nuclear triad”…

Back in 2015, while working on a Gartner SOC paper, I coined the concept of “SOC nuclear triad” which later morphed into “SOC visibility triad” or even “security visibility triad.” The thing then became very popular with some security vendors, especial… Continue reading Back in 2015, while working on a Gartner SOC paper, I coined the concept of “SOC nuclear triad”…