Security Balance
Subscribe
Sign in
Home
Archive
About
Page not found
New
Top
Endpoint Dependency
How detection is addicted to endpoint telemetry, and how to fix it
Mar 11
•
Augusto Barros
Share this post
Endpoint Dependency
blog.securitybalance.com
Copy link
Facebook
Email
Note
Other
December 2023
The Fallacy Of SIEM Alternatives
Fallacy: A fallacy, also known as paralogia in modern psychology, is the use of invalid or otherwise faulty reasoning in the construction of an argument…
Dec 20, 2023
•
Augusto Barros
Share this post
The Fallacy Of SIEM Alternatives
blog.securitybalance.com
Copy link
Facebook
Email
Note
Other
What To Do When Threats Become Trivial?
A fascinating aspect of security operations teams is about how threats eventually become trivial, and what happens once they are seen that way. Trivial…
Dec 20, 2023
•
Augusto Barros
Share this post
What To Do When Threats Become Trivial?
blog.securitybalance.com
Copy link
Facebook
Email
Note
Other
The Perils of Over-Consolidation in Cybersecurity: Lessons from Tolkien's Middle-Earth
In the realm of cybersecurity, the trend toward consolidation is becoming increasingly prominent. Many vendors are striving to create comprehensive…
Dec 20, 2023
•
Augusto Barros
Share this post
The Perils of Over-Consolidation in Cybersecurity: Lessons from Tolkien's Middle-Earth
blog.securitybalance.com
Copy link
Facebook
Email
Note
Other
June 2023
Risk or Threat Oriented Security: Which Path Should We Choose?
Lately, I've been engaged in various discussions about what should drive our security efforts: risk or threats. It's an interesting debate, and today I…
Jun 6, 2023
•
Augusto Barros
Share this post
Risk or Threat Oriented Security: Which Path Should We Choose?
blog.securitybalance.com
Copy link
Facebook
Email
Note
Other
October 2021
Cybersecurity Is Not A Pair Of Sneakers
"Just do it" does not work for cybersecurity. I've seen many comparisons with very complex things we've managed to accomplish. Man on the Moon, robots…
Oct 14, 2021
•
Augusto Barros
Share this post
Cybersecurity Is Not A Pair Of Sneakers
blog.securitybalance.com
Copy link
Facebook
Email
Note
Other
Do Not Look For A Root Cause
Reading about root cause analysis (RCA) for security breaches really freaks me out. Root causes are behind accidents and other unintentional events. Not…
Oct 8, 2021
•
Augusto Barros
Share this post
Do Not Look For A Root Cause
blog.securitybalance.com
Copy link
Facebook
Email
Note
Other
May 2021
Professional Certifications, Reboot!
After two months and a few hundred dollars later, my most recent personal project is completed. 10 years after my TOGAF9 certification, I decided to…
May 7, 2021
•
Augusto Barros
Share this post
Professional Certifications, Reboot!
blog.securitybalance.com
Copy link
Facebook
Email
Note
Other
April 2021
The Bright Future of Cloud SIEM
TL;DR: People keep questioning SIEM value, but cloud SIEM makes SIEM so much better. SIEM is now capable of delivering a lot of security value with far…
Apr 16, 2021
•
Augusto Barros
Share this post
The Bright Future of Cloud SIEM
blog.securitybalance.com
Copy link
Facebook
Email
Note
Other
March 2021
Some additional words on those SOC robots
The topic on SOC automation is really a fun one to think about, and even after putting my thoughts into words with my last post, I've still kept…
Mar 19, 2021
•
Augusto Barros
Share this post
Some additional words on those SOC robots
blog.securitybalance.com
Copy link
Facebook
Email
Note
Other
The Robots Are Coming!
The debate around SOC automation has been a fun one to follow. Allie Mellen wrote a short but on the spot piece about it, reaffirming what seems to be…
Mar 16, 2021
•
Augusto Barros
Share this post
The Robots Are Coming!
blog.securitybalance.com
Copy link
Facebook
Email
Note
Other
An Analysis of Past Mistakes
As I was looking for an old email in my archives, I stumbled on discussions about a security incident that happened almost 13 years ago. That was that…
Mar 4, 2021
•
Augusto Barros
Share this post
An Analysis of Past Mistakes
blog.securitybalance.com
Copy link
Facebook
Email
Note
Other
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts