Thanks for visiting The Cell Phone Junkie! I will be taking the time each week to discuss my favorite topic, cell phones. Any feedback is appreciated and welcome. You can email me at: questions (AT) thecellphonejunkie (DOT) com or call: 206-203-3734 Thanks and welcome!
…
continue reading
A tartalmat a Anton Chuvakin biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a Anton Chuvakin vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.
Player FM - Podcast alkalmazás
Lépjen offline állapotba az Player FM alkalmazással!
Lépjen offline állapotba az Player FM alkalmazással!
EP234 The SIEM Paradox: Logs, Lies, and Failing to Detect
MP3•Epizód kép
Manage episode 494394114 series 2892548
A tartalmat a Anton Chuvakin biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a Anton Chuvakin vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.
Guest:
- Svetla Yankova, Founder and CEO, Citreno
Topics:
- Why do so many organizations still collect logs yet don’t detect threats? In other words, why is our industry spending more money than ever on SIEM tooling and still not “winning” against Tier 1 ... or even Tier 5 adversaries?
- What are the hardest parts about getting the right context into a SOC analyst’s face when they’re triaging and investigating an alert? Is it integration? SOAR playbook development? Data enrichment? All of the above?
- What are the organizational problems that keep organizations from getting the full benefit of the security operations tools they’re buying?
- Top SIEM mistakes? Is it trying to migrate too fast? Is it accepting a too slow migration? In other words, where are expectations tyrannical for customers? Have they changed much since 2015?
- Do you expect people to write their own detections? Detecting engineering seems popular with elite clients and nobody else, what can we do?
- Do you think AI will change how we SOC (Tim: “SOC” is not a verb?) in the next 1- 3 -5 years?
- Do you think that AI SOC tech is repeating the mistakes SOAR vendors made 10 years ago? Are we making the same mistakes all over again? Are we making new mistakes?
Resources:
- EP223 AI Addressable, Not AI Solvable: Reflections from RSA 2025
- EP231 Beyond the Buzzword: Practical Detection as Code in the Enterprise
- EP228 SIEM in 2025: Still Hard? Reimagining Detection at Cloud Scale and with More Pipelines
- EP202 Beyond Tiered SOCs: Detection as Code and the Rise of Response Engineering
- “RSA 2025: AI’s Promise vs. Security’s Past — A Reality Check” blog
- Citreno, The Backstory
- “Parenting Teens With Love And Logic” book (as a management book)
- “Security Correlation Then and Now: A Sad Truth About SIEM” blog (the classic from 2019)
249 epizódok
MP3•Epizód kép
Manage episode 494394114 series 2892548
A tartalmat a Anton Chuvakin biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a Anton Chuvakin vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.
Guest:
- Svetla Yankova, Founder and CEO, Citreno
Topics:
- Why do so many organizations still collect logs yet don’t detect threats? In other words, why is our industry spending more money than ever on SIEM tooling and still not “winning” against Tier 1 ... or even Tier 5 adversaries?
- What are the hardest parts about getting the right context into a SOC analyst’s face when they’re triaging and investigating an alert? Is it integration? SOAR playbook development? Data enrichment? All of the above?
- What are the organizational problems that keep organizations from getting the full benefit of the security operations tools they’re buying?
- Top SIEM mistakes? Is it trying to migrate too fast? Is it accepting a too slow migration? In other words, where are expectations tyrannical for customers? Have they changed much since 2015?
- Do you expect people to write their own detections? Detecting engineering seems popular with elite clients and nobody else, what can we do?
- Do you think AI will change how we SOC (Tim: “SOC” is not a verb?) in the next 1- 3 -5 years?
- Do you think that AI SOC tech is repeating the mistakes SOAR vendors made 10 years ago? Are we making the same mistakes all over again? Are we making new mistakes?
Resources:
- EP223 AI Addressable, Not AI Solvable: Reflections from RSA 2025
- EP231 Beyond the Buzzword: Practical Detection as Code in the Enterprise
- EP228 SIEM in 2025: Still Hard? Reimagining Detection at Cloud Scale and with More Pipelines
- EP202 Beyond Tiered SOCs: Detection as Code and the Rise of Response Engineering
- “RSA 2025: AI’s Promise vs. Security’s Past — A Reality Check” blog
- Citreno, The Backstory
- “Parenting Teens With Love And Logic” book (as a management book)
- “Security Correlation Then and Now: A Sad Truth About SIEM” blog (the classic from 2019)
249 epizódok
모든 에피소드
×Üdvözlünk a Player FM-nél!
A Player FM lejátszó az internetet böngészi a kiváló minőségű podcastok után, hogy ön élvezhesse azokat. Ez a legjobb podcast-alkalmazás, Androidon, iPhone-on és a weben is működik. Jelentkezzen be az feliratkozások szinkronizálásához az eszközök között.