<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Security Balance]]></title><description><![CDATA[Augusto Barros blog on many things cybersecurity. ]]></description><link>https://blog.securitybalance.com</link><image><url>https://substackcdn.com/image/fetch/$s_!4xWt!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc63fe9-63b9-474b-81d1-94e76f62f45e_1280x1280.png</url><title>Security Balance</title><link>https://blog.securitybalance.com</link></image><generator>Substack</generator><lastBuildDate>Thu, 16 Apr 2026 14:38:45 GMT</lastBuildDate><atom:link href="https://blog.securitybalance.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Unknown]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[securitybalance@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[securitybalance@substack.com]]></itunes:email><itunes:name><![CDATA[Augusto Barros]]></itunes:name></itunes:owner><itunes:author><![CDATA[Augusto Barros]]></itunes:author><googleplay:owner><![CDATA[securitybalance@substack.com]]></googleplay:owner><googleplay:email><![CDATA[securitybalance@substack.com]]></googleplay:email><googleplay:author><![CDATA[Augusto Barros]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[The Evolving Blueprint of TDIR Architecture]]></title><description><![CDATA[Is the SIEM Still the Security Core?]]></description><link>https://blog.securitybalance.com/p/the-evolving-blueprint-of-tdir-architecture</link><guid isPermaLink="false">https://blog.securitybalance.com/p/the-evolving-blueprint-of-tdir-architecture</guid><dc:creator><![CDATA[Augusto Barros]]></dc:creator><pubDate>Fri, 12 Dec 2025 22:08:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4xWt!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc63fe9-63b9-474b-81d1-94e76f62f45e_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>For years, the <strong>SIEM</strong> system has been the core of the <strong>SOC</strong>, sitting at the center of the <strong>Threat Detection, Investigation, and Response (TDIR)</strong> architecture. It served as the central brain, performing three critical, overlapping functions.</p><h3><strong>The Traditional SIEM-Centric TDIR Model</strong></h3><p>In the traditional model, the SIEM is tasked with:</p><ol><li><p><strong>Detection System:</strong> Collecting <strong>granular events</strong> from various data sources (like identity providers) and applying detection logic (rules, ML models) to identify potential threats. For example, looking at simple authentication events to generate an alert for suspicious activity. (SIEM as a detection system)</p></li><li><p><strong>Consolidation and Aggregation System:</strong> Collecting alerts generated by <em>other</em> security solutions (EDR, email security, IDP) and <strong>correlating</strong> them into a unified <strong>attack chain</strong> or case. This provides investigators with crucial context&#8212;for instance, connecting a phishing email alert, a suspicious URL access, and a subsequent malware execution into a single, comprehensive investigation case.</p></li><li><p><strong>Log Management and Data Retention System:</strong> Maintaining all granular events and alerts for long periods, acting as a <strong>single source of truth</strong> for analysts performing investigations and <strong>threat hunting</strong>. (SIEM as log management, data retention system)</p></li></ol><p>The appeal of this model is its <strong>centralization of signals</strong>, which naturally enables all three use cases and encourages the idea of centralized investigation.</p><p>This centralized position made the SIEM a highly attractive tool, yet having all these functions bundled together has often led to the tool becoming <strong>bloated, expensive, and complex</strong> to maintain, rarely delivering good results across all use cases simultaneously. Many organizations still struggle with partial implementations, driving a search for a more flexible, cost-effective TDIR pattern.</p><h3><strong>The Critical Role of Detection Architecture</strong></h3><p>The trend of SIEMs evolving into primarily <strong>alert aggregators</strong> underscores the importance of <strong>&#8220;detection architecture&#8221;</strong>&#8212;a critical planning step that precedes detection engineering.</p><p>A robust detection architecture requires a good understanding of how <strong>every piece</strong> of your environment&#8212;including different threat categories and technologies&#8212;will be covered for detection.</p><ul><li><p><strong>Specialized Tools:</strong> Certain threats and environments are best covered by specialized tools (e.g., XDR/EDR for endpoints, CNAPP/CSPM for cloud environments). These tools handle the detection logic locally and send resulting alerts downstream.</p></li><li><p><strong>Centralized Telemetry:</strong> Other systems lacking specialized detection capabilities funnel their granular telemetry into a centralized system (historically the SIEM, often with a UEBA component) where custom detection logic is applied.</p></li></ul><p>This is a <strong>multidimensional puzzle</strong> every organization must assemble according to its unique needs. However, the outcome is clear: the <strong>SIEM will almost never be entirely responsible for detection.</strong></p><p>This reality forces us to focus on the <strong>downstream TDIR architecture</strong>: Where should all the alerts&#8212;both from specialized tools and the SIEM itself&#8212;go next?</p><ul><li><p><strong>Option A:</strong> Enforce all alerts getting into the SIEM for an additional layer of contextualization and correlation.</p></li><li><p><strong>Option B:</strong> Send all individual alerts, from the SIEM and from other sources, downstream directly to an investigation engine, such as an AI-SOC solution.</p></li></ul><h3><strong>The Emerging Decentralized TDIR Pattern</strong></h3><p>The decentralized model embraces Option B, allowing for a more agile and cost-effective TDIR architecture:</p><ul><li><p><strong>Distributed Detections:</strong> Detection logic is run where the data originates (in specialized security tools or the SIEM for niche/custom needs).</p></li><li><p><strong>Centralized Investigation Engine:</strong> Individual alerts are sent directly to an <strong>AI-SOC</strong> solution. This tool becomes the hub for performing or supporting the investigation. <strong>Connecting individual alerts related to the same threat happens at investigation time</strong>.</p></li><li><p><strong>Data-on-Demand:</strong> The AI-SOC queries the necessary security and infrastructure systems at investigation time to collect additional data and context. This key shift eliminates the massive, costly, and often unnecessary need to <strong>send all data in advance</strong> to a centralized location.</p></li><li><p><strong>Cost-Effective Retention:</strong> Granular, voluminous data needed for long-term retention is stored in <strong>cheaper data repositories</strong> like S3 buckets, Databricks, Snowflake, or other data lakes, which can be easily queried by the investigation engine when needed.</p></li></ul><h3><strong>The Future: SIEMless or Just SIEM-Lite?</strong></h3><p>The decentralized pattern is the clear current trend. However, organizations must address the two main challenges:</p><ol><li><p><strong>Handling Detection Gaps:</strong> For systems without native detection capability (e.g., custom application logs), a SIEM or UEBA component is still needed. The compromise is adopting a <strong>smaller, specialized SIEM (Maybe a &#8220;SIEM-Lite&#8221;?)</strong> just for these niche, custom-detection use cases.</p></li><li><p><strong>Consolidated View:</strong> The SOC needs a way to have a consolidated view of <strong>detection coverage</strong> across all distributed detection tools.</p></li></ol><p>The power of <strong>AI systems</strong> is what makes the decentralized model practical. AI-SOC capabilities simplify the complexity of managing distributed systems by:</p><ul><li><p><strong>Dynamically Generating and translating</strong> threat hunts and investigations plans across multiple disparate technologies and APIs.</p></li><li><p><strong>Removing the need</strong> to write detailed and prescriptive playbooks in advance, which usually require extensive pre-work and continuous maintenance.</p></li></ul><p>The move toward a decentralized system points to less reliance on a single, monolithic SIEM as the sole TDIR core. It fosters a more flexible, loosely coupled, and agile architecture capable of adapting to the rapid pace of modern cyber threats.<br><br>Thanks to <a href="https://secops-unpacked.ai/">Filip Stojkovski</a> for the <a href="https://www.linkedin.com/posts/filipstojkovski_another-week-in-the-books-another-friday-activity-7405241179216252928-ybWs?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAAB5zcBQL9XJxhNp-GkF6NX98jnNdRY6-0">LinkedIn post </a>that served as inspiration for this thinking nugget.</p>]]></content:encoded></item><item><title><![CDATA[Navigating the Shifting Sands: My Take on the 2025 Gartner SIEM Magic Quadrant]]></title><description><![CDATA[The annual release of the Gartner Magic Quadrant for Security Information and Event Management (SIEM) always sparks conversation, and the 2025 edition is no exception.]]></description><link>https://blog.securitybalance.com/p/navigating-the-shifting-sands-my</link><guid isPermaLink="false">https://blog.securitybalance.com/p/navigating-the-shifting-sands-my</guid><dc:creator><![CDATA[Augusto Barros]]></dc:creator><pubDate>Thu, 16 Oct 2025 01:08:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4xWt!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc63fe9-63b9-474b-81d1-94e76f62f45e_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The annual release of the Gartner Magic Quadrant for Security Information and Event Management (SIEM) always sparks conversation, and the 2025 edition is no exception. As someone who has been somewhat involved in the SIEM MQ for almost a decade, I&#8217;ve had a chance to digest the report, and there are several shifts and subtleties that I believe are particularly noteworthy.</p><p>First, let&#8217;s talk about the titans. <strong>Microsoft and Splunk have firmly cemented their positions as the enterprise SIEM leaders.</strong> This consolidation at the top isn&#8217;t entirely surprising, given their extensive market penetration and robust offerings. What <em>is</em> impressive, however, is Splunk&#8217;s continued strength. I, like many, anticipated a more immediate impact from the Cisco acquisition. It seems the &#8220;stickiness&#8221; of SIEM, particularly for established players, is incredibly strong, allowing Splunk to maintain its leadership position despite the looming integration challenges.</p><h3>The Slow Bleed of the Former Contenders</h3><p>Further down the Leaders quadrant, we see <strong>Securonix and Exabeam, who appear to be slowly bleeding market differentiation.</strong> While still recognized as leaders by Gartner, their struggle to stand out in the broader SIEM space is becoming increasingly apparent. They seem to be gravitating back towards their roots as best-of-breed User and Entity Behavior Analytics (UEBA) providers. Joining them in this trend, after years of chasing the Leaders quadrant, is Gurucul. I expect to see these three fall out of the Leaders quadrant soon, as the major platform players continue to dominate market share with more comprehensive offerings. Evidence of that? Just check how these vendors have been positioning their products as add-ons to Splunk and Microsoft Sentinel.</p><h3>The Ascending Challenger: Google</h3><p>The most significant challenger to the established duopoly of Splunk and Microsoft, in my view, is <strong>Google</strong>. Their Security Operations stack is evolving, perhaps slowly, but with a beautiful roadmap and relentless execution. While data gravity remains a hurdle for Google to gain significant traction among Azure and AWS customers, the sheer volume of business within the GCP sphere provides ample fuel for the continuous evolution and refinement of their security products. Their progress here is definitely one to watch.</p><p>Other notable entries this year are <strong>Palo Alto Networks and Crowdstrike</strong>. Both have made their debut on the MQ, and I anticipate both will join the Leaders quadrant in the next year. They share a similar strategic advantage with Google: the ability to fuel their SIEM evolution by cross-selling to their extensive platform customer bases. This integrated approach, leveraging existing customer relationships, provides a powerful engine for growth and development in the SIEM space.</p><h3>Absences and the &#8220;Line in the Sand&#8221;</h3><p>However, the most interesting aspect of this year&#8217;s MQ, for me, lies in its <strong>absences</strong>. Firstly, <strong>ArcSight is finally gone</strong>, marking the end of an era for many. More importantly, the new crop of innovative SIEMs, such as <strong>Hunters, Panther, and Anvilogic, are still not present.</strong> This is primarily due to Gartner&#8217;s strict, business-metrics-based inclusion criteria.</p><p>It&#8217;s crucial to understand that their absence does not diminish their quality or potential. These criteria often serve as an arbitrary line in the sand, designed to manage the workload of the analysts producing the MQ. From a new business and growth perspective, many of these emerging players are outperforming established names like Securonix and Exabeam. It&#8217;s a pity we don&#8217;t get to see their progress reflected in this particular report. While Datadog managed to squeeze in, Databricks, another intriguing player, is still noticeably absent.</p><h3>Beyond the Quadrant: A Call for a Modern Comparison</h3><p>The Gartner Magic Quadrant (and its associated Critical Capabilities report) remains an invaluable resource for understanding the SIEM market at a high level. It offers a snapshot of market dynamics and vendor positioning. However, I believe we&#8217;re still missing a truly comprehensive SIEM comparison resource.</p><p>What I envision is a resource with a more modern set of requirements, a more rigorous claim validation process (the things vendors say they do&#8230;), and significantly less weight placed on factors such as the size of sales teams or the volume of marketing campaigns. </p><p>Will anyone step up to this challenge and provide the industry with the truly modern, in-depth SIEM comparison we need?</p>]]></content:encoded></item><item><title><![CDATA[Building a More Resilient Future for Threat Detection]]></title><description><![CDATA[Pick your favorite breach or famous security incident and you'll notice that among the multiple issues that allowed it to happen (it's never just one thing), failing to detect the threat is always there.]]></description><link>https://blog.securitybalance.com/p/building-a-more-resilient-future</link><guid isPermaLink="false">https://blog.securitybalance.com/p/building-a-more-resilient-future</guid><dc:creator><![CDATA[Augusto Barros]]></dc:creator><pubDate>Wed, 17 Sep 2025 20:20:54 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!OYUC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd005d74-e2de-4366-aac2-22c180d5abc5_1782x848.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Pick your favorite breach or famous security incident and you'll notice that among the multiple issues that allowed it to happen (it's never just one thing), failing to detect the threat is always there. These multiple failures in detecting threats are, in my opinion, a strong indicator that current threat detection systems are often brittle, not resilient. The crucial concept of resilience, defined as <em>the degree to which a system continues to perform its critical functions under disturbance or its ability to successfully adapt to stressors</em>, is paramount for effective threat detection. In the cybersecurity context, resilience refers to <em>an organization's capacity to prevent, withstand, and recover from incidents while maintaining essential business operations, even when cyber defenses are compromised</em>. This implies that incidents are inevitable and controls will sometimes fail. This is the strongest argument for a robust threat detection and response practice, and still, those practices are also subject to failure and need to incorporate resilience too.</p><h3>Threat Detection as a System</h3><p>A threat detection system functions by ingesting signals and context from the observed IT environment, alongside threat intelligence. Detection engineering processes these inputs to create "detections" (rules, use cases, signatures), which detection engines then apply to identify malicious activity and generate alerts for a response system.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OYUC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd005d74-e2de-4366-aac2-22c180d5abc5_1782x848.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OYUC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd005d74-e2de-4366-aac2-22c180d5abc5_1782x848.png 424w, https://substackcdn.com/image/fetch/$s_!OYUC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd005d74-e2de-4366-aac2-22c180d5abc5_1782x848.png 848w, https://substackcdn.com/image/fetch/$s_!OYUC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd005d74-e2de-4366-aac2-22c180d5abc5_1782x848.png 1272w, https://substackcdn.com/image/fetch/$s_!OYUC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd005d74-e2de-4366-aac2-22c180d5abc5_1782x848.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OYUC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd005d74-e2de-4366-aac2-22c180d5abc5_1782x848.png" width="1456" height="693" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dd005d74-e2de-4366-aac2-22c180d5abc5_1782x848.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:693,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:230131,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.securitybalance.com/i/173880270?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd005d74-e2de-4366-aac2-22c180d5abc5_1782x848.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OYUC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd005d74-e2de-4366-aac2-22c180d5abc5_1782x848.png 424w, https://substackcdn.com/image/fetch/$s_!OYUC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd005d74-e2de-4366-aac2-22c180d5abc5_1782x848.png 848w, https://substackcdn.com/image/fetch/$s_!OYUC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd005d74-e2de-4366-aac2-22c180d5abc5_1782x848.png 1272w, https://substackcdn.com/image/fetch/$s_!OYUC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd005d74-e2de-4366-aac2-22c180d5abc5_1782x848.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I used <a href="https://www.securitychaoseng.com/">Kelly Shortridge and Aaron Rinehart's &#8220;template&#8221;</a> for a system's resilience statement to define Detection resilience as <strong>"the resilience of threat detection systems against detection failures, caused either by random component failures or intentional attacker behavior so that the organization can detect threats as they occur"</strong>. The core idea is to expect security controls to fail, including components of the detection system, and prepare accordingly, focusing on the ability to quickly and effectively adapt rather than attempting to completely avoid them, so you can keep your ability to detect threats functional.</p><h3>Where Threat Detection Breaks</h3><p>Threat detection systems are prone to several failure modes that compromise their resilience.</p><p>One of those is about <strong>brittle detections. </strong>Detections are often too specific, failing to adapt to minor deviations in threat behavior or the signals they generate. These detections commonly rely on simple boolean logic, such as "if A and B happens, alert," or straightforward pattern matching, frequently seen in IOC matching. Similarly, detections based on fixed thresholds, like alerting if more than 100MB is sent outbound, would fail if a clear data exfiltration attack happens to transfer only 99MB, highlighting their inherent fragility.</p><p>Another common failure point arises from the <strong>focus on choke points</strong> in attack paths. While it is reasonable to concentrate detection efforts on these critical junctures, especially when triage and investigation resources are expensive, doing so creates single points of failure for detection. If an attacker finds a way to bypass a choke point (rare, as choke points are exactly the points that are harder for the attacker to avoid, but it's possible), the entire attack can go undetected. Even if a bypass is unlikely, failures affecting the generation of the necessary telemetry at these choke points can also lead to blind spots.</p><p>Threat detection systems also suffer from <strong>single layer coverage</strong>, meaning an over-reliance on a particular type of detection technology. This is frequently observed as "endpoint dependency," where most detections are built for EDR due to the rich telemetry available. However, not all attacks touch endpoints, and EDR deployments are not completely reliable; the average EDR coverage for endpoints is only <a href="https://info.xmcyber.com/2024-state-of-exposure-management">72%, leaving 28% of endpoints exposed</a>. Similar issues can arise in SIEM-focused organizations, <a href="https://cardinalops.com/white-papers/2025-state-of-siem-report-download/">where an average of 13% of SIEM rules are broken and never fire</a>. The trend towards "platformization," or relying on a single vendor for multiple security components, can exacerbate this vulnerability, as a flaw or corrupted piece of intelligence in that vendor's system could lead to widespread detection failures across the entire environment.</p><p><strong>Excessive tuning</strong> is another problem that undermines detection resilience. Threat detection is fundamentally a classification problem, balancing precision (reducing false positives) and recall (reducing false negatives). Because the cost of dealing with false positives is high and SOCs are often overwhelmed, detection engineers tend to over-tune rules for precision, prioritizing it over recall. This focus on reducing alert volume inadvertently increases the chance of false negatives, causing actual threats to be missed due to an effort to optimize resource management.</p><p>The practice of <strong>signals filtering</strong> also introduces vulnerabilities. To reduce the costs associated with ingesting massive volumes of telemetry into detection engines, organizations often apply aggressive filtering, aggregation, field trimming, and truncation. While this optimizes resource utilization and reduces costs, it heightens the risk of inadvertently discarding essential data needed for detection, creating "unconscious blind spots". This cost-saving measure can severely compromise the system's ability to detect threats.</p><p>Finally, <strong>brittle pipelines</strong> represent a critical failure point. Threat detection technologies are often oblivious to issues within the data pipelines that collect and transport signals from the environment to the detection engines. Problems such as data not flowing, missing agents on assets, or incorrect API credentials can lead to silent blind spots, where the detection system is simply unaware that crucial telemetry is absent. These pipeline failures silently degrade detection capabilities, leaving organizations vulnerable without immediate awareness.</p><h3>Principles for Resilient Threat Detection</h3><p>Addressing these vulnerabilities requires a multi-faceted approach, emphasizing awareness within security operations teams about detection resilience and improvements across architecture, detection engineering, response throughput, and testing.</p><h4>Principle 1: Resilient Detection Architecture</h4><p>The architectural foundation of threat detection must enable resilience. This involves ensuring threats and assets are covered from multiple angles, as exemplified by the <a href="https://medium.com/anton-on-security/soc-visibility-triad-is-now-a-quad-soc-visibility-quad-2025-72811401073a">SOC visibility quad</a> (Endpoint, Logs, Network, Application). This multi-layered approach, including EDR for endpoints, SIEM for logs, NDR for networks, and ADR for applications, allows for detection even if one layer is compromised or lacks visibility. For instance, an attack missed at the endpoint could still be caught by log or network analysis. Additionally, resilient architecture demands instrumentation for early failure and degradation detection within the detection pipeline, along with the use of buffers to prevent data loss during minor disruptions. When aggressive filtering is applied, organizations should also leverage alternative data repositories, such as cheaper cold cloud storage, to store full fidelity data for retrospective analysis, thus compensating for primary filtering.</p><p>It is also crucial to identify the detection system&#8217;s safety boundaries, which include both process thresholds (like triage volume and risk acceptance levels) and system thresholds (such as data volume, alert volume, and detector health). Understanding these critical limits helps anticipate system failure and react proactively, preventing surprises when the system is under stress. Furthermore, applying resilient-friendly architecture patterns like decentralization, redundancy, and loose coupling is vital. Loose coupling, for example, makes detection content production independent from specific tools and abstracts tool functionality, enhancing flexibility and reducing dependencies.</p><h4>Principle 2: Resilience Embedded in Detection Engineering</h4><p>Detection engineering practices must actively consider resilience implications in the design of detections. Engineers must balance precision and recall, moving beyond an excessive preference for precision, even if it means accepting a higher level of false positives. Integrating heuristic and dynamic approaches alongside simple boolean logic and static IOCs is also essential. Adaptive methods like anomaly detection and machine learning-driven UEBA are more resilient to minor variations in attack techniques than fixed thresholds.</p><p>While choke points are useful for prioritizing detection development, they should not be seen as a means to optimize coverage. The focus should be on broader detection coverage, using choke points to highlight more critical alerts. Aligning detection efforts with the "pyramid of pain" by focusing on TTPs rather than brittle IOCs is paramount for long-term effectiveness. Detection engineers must adopt a mindset that expects certain detection engines and detections to fail, designing systems with redundant coverage and alternative methods in mind. Finally, establishing robust continuous feedback loops from incident response to detection engineering is necessary to learn from missed detections and false negatives, iteratively improving content and strategies.</p><h4>Principle 3: Increase Response Throughput</h4><p>Insufficient capacity to handle alerts directly undermines detection resilience by forcing aggressive filtering and tuning. Traditional, human-intensive SOC models cannot provide the necessary throughput for resilient detection. Leveraging automation, particularly AI SOC tools, such as <strong><a href="https://prophetsecurity.ai">Prophet Security</a></strong>, is crucial for accelerating alert triage and initial investigation steps. Even if these tools are not fully autonomous, they significantly improve the number of alerts a SOC can manage, allowing for broader detection coverage without being overwhelmed and reducing the need for excessive tuning.</p><h4>Principle 4: Apply Chaos Engineering</h4><p>Continuous testing is essential to proactively identify resilience issues within detection systems. This can involve "live" testing with CTEM tools and continuous pentesting in production environments, with automation playing a key role in increasing efficiency. Tabletop exercises can complement live testing by simulating scenarios where detection capabilities might be degraded, such as the loss of EDR visibility. Experiments should be designed using a template like: "In the event of condition X, we are confident that our system will respond by Y," which for detection systems translates to: "If the attacker does X, we are confident that we will detect it with detector Y and detection Z". This also includes testing the confidence that triage will properly identify true positives.</p><p><em>&#8220;This is the beauty of SCE: by conducting specific experiments, you can test hypotheses about your system&#8217;s resilience to different types of adverse conditions and observe how your systems respond to them&#8221; - K. Shortridge / A. Rinehart</em></p><p>Chaos experiments are distinguished from typical tests by supporting resilience (rather than just robustness), being sociotechnical (including humans), system-focused, capable of being run in production, random or pseudorandom, addressing adverse scenarios, observing and learning from failures, and considering N-order effects. The primary goal of these experiments is to maintain critical functions under disturbance rather than solely preventing component failure, minimizing the consequences of surprises rather than minimizing the probability of damages.</p><h4>Bonus Principle: Deception</h4><p>Deception technologies offer a powerful way to add resilience to threat detection systems. They often generate signals directly tied to threat behavior, which reduces their dependency on the primary, potentially brittle, signals pipeline. Deception artifacts can cover numerous attack paths, acting as "natural choke points" that increase detection chances even without specific, pre-built detections. Furthermore, deception can be deployed across the entire SOC visibility quad, including network honeypots, honeytokens for identity, and application-level deceptions.</p><h3>The Path Forward: A Nascent Area of Continuous Improvement</h3><p>The journey toward truly resilient threat detection is still in its early stages. While significant progress can be made by adopting the principles outlined above, much work remains. Future endeavors should focus on evolving these principles to provide more specific guidance, developing standardized reference architectures, and enhancing processes for building less brittle detections within the detection engineering pipeline. An ambitious concept to explore is "anti-fragile" threat detection systems&#8212;systems that not only withstand stressors but become stronger and more capable when subjected to them.</p><p>By embracing a resilience-first mindset, understanding common failure points, and strategically applying architectural, engineering, operational, and testing principles, organizations can significantly improve their ability to detect threats. This should be an ongoing conversation and a critical area for continued research and development.</p><p></p><p><em>Many ideas and concepts directly borrowed from </em>Kelly Shortridge and Aaron Rinehart's <a href="https://www.securitychaoseng.com/">&#8220;Security Chaos Engineering&#8221;</a>.</p>]]></content:encoded></item><item><title><![CDATA[Are AI SOC Solutions the Real Deal or Just Hype?]]></title><description><![CDATA[It's always fun to answer to smart people's questions]]></description><link>https://blog.securitybalance.com/p/are-ai-soc-solutions-the-real-deal</link><guid isPermaLink="false">https://blog.securitybalance.com/p/are-ai-soc-solutions-the-real-deal</guid><dc:creator><![CDATA[Augusto Barros]]></dc:creator><pubDate>Mon, 11 Aug 2025 18:26:23 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Ku3P!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07218e8e-dd63-43ad-98a0-73b9616145c5_1020x876.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Any hyped technology produces a strong reaction from smart people capable of identifying when things go out of proportion (or when dots get closer to the &#8220;peak of inflated expectations&#8221;). It hasn't been different with AI SOC solutions. In the past few days, I've seen a couple of very good LinkedIn posts from very smart guys questioning the value and proposition of these tools:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.linkedin.com/posts/chuvakin_soar-activity-7358999324283850754-ja5S?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAAB5zcBQL9XJxhNp-GkF6NX98jnNdRY6-0" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ku3P!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07218e8e-dd63-43ad-98a0-73b9616145c5_1020x876.png 424w, https://substackcdn.com/image/fetch/$s_!Ku3P!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07218e8e-dd63-43ad-98a0-73b9616145c5_1020x876.png 848w, https://substackcdn.com/image/fetch/$s_!Ku3P!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07218e8e-dd63-43ad-98a0-73b9616145c5_1020x876.png 1272w, https://substackcdn.com/image/fetch/$s_!Ku3P!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07218e8e-dd63-43ad-98a0-73b9616145c5_1020x876.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ku3P!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07218e8e-dd63-43ad-98a0-73b9616145c5_1020x876.png" width="728" height="625.2235294117647" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/07218e8e-dd63-43ad-98a0-73b9616145c5_1020x876.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:876,&quot;width&quot;:1020,&quot;resizeWidth&quot;:728,&quot;bytes&quot;:151816,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.linkedin.com/posts/chuvakin_soar-activity-7358999324283850754-ja5S?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAAB5zcBQL9XJxhNp-GkF6NX98jnNdRY6-0&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.securitybalance.com/i/170713771?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07218e8e-dd63-43ad-98a0-73b9616145c5_1020x876.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Ku3P!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07218e8e-dd63-43ad-98a0-73b9616145c5_1020x876.png 424w, https://substackcdn.com/image/fetch/$s_!Ku3P!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07218e8e-dd63-43ad-98a0-73b9616145c5_1020x876.png 848w, https://substackcdn.com/image/fetch/$s_!Ku3P!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07218e8e-dd63-43ad-98a0-73b9616145c5_1020x876.png 1272w, https://substackcdn.com/image/fetch/$s_!Ku3P!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07218e8e-dd63-43ad-98a0-73b9616145c5_1020x876.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.linkedin.com/posts/erikbloch_if-over-80-of-all-alerts-are-benign-or-duplicates-activity-7358196799905386497-QMmP?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAAB5zcBQL9XJxhNp-GkF6NX98jnNdRY6-0" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!pzEx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe506cf9a-77b2-4e0e-afa8-882fa479080f_824x1494.png 424w, https://substackcdn.com/image/fetch/$s_!pzEx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe506cf9a-77b2-4e0e-afa8-882fa479080f_824x1494.png 848w, https://substackcdn.com/image/fetch/$s_!pzEx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe506cf9a-77b2-4e0e-afa8-882fa479080f_824x1494.png 1272w, https://substackcdn.com/image/fetch/$s_!pzEx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe506cf9a-77b2-4e0e-afa8-882fa479080f_824x1494.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!pzEx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe506cf9a-77b2-4e0e-afa8-882fa479080f_824x1494.png" width="824" height="1494" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e506cf9a-77b2-4e0e-afa8-882fa479080f_824x1494.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1494,&quot;width&quot;:824,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:271207,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.linkedin.com/posts/erikbloch_if-over-80-of-all-alerts-are-benign-or-duplicates-activity-7358196799905386497-QMmP?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAAB5zcBQL9XJxhNp-GkF6NX98jnNdRY6-0&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.securitybalance.com/i/170713771?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe506cf9a-77b2-4e0e-afa8-882fa479080f_824x1494.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!pzEx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe506cf9a-77b2-4e0e-afa8-882fa479080f_824x1494.png 424w, https://substackcdn.com/image/fetch/$s_!pzEx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe506cf9a-77b2-4e0e-afa8-882fa479080f_824x1494.png 848w, https://substackcdn.com/image/fetch/$s_!pzEx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe506cf9a-77b2-4e0e-afa8-882fa479080f_824x1494.png 1272w, https://substackcdn.com/image/fetch/$s_!pzEx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe506cf9a-77b2-4e0e-afa8-882fa479080f_824x1494.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p></p><p>I read these while going through &#8220;booth duty&#8221; at Black Hat, and since then I was dying to jump in the conversation. It wasn't just a simple case of posting rabid &#8220;you are wrong!!&#8221; comments, as their posts have merits. While they highlight the challenges of low-fidelity detection and the perceived redundancy with existing SOAR tools, a closer look reveals that AI SOC solutions are not just another "band-aid" but a necessary evolution in security operations. Sometimes they solve a different, yet equally critical, problem. They also approach some of the old problems in a more efficient and effective manner. So let's jump in.</p><h4><strong>The Problem with Detection: More Than Just "Bad Detections"</strong></h4><p>Erik Bloch's point about low-fidelity alerts and the "logical fallacy" of using AI to triage them is a powerful one. It&#8217;s true that many detection solutions (like XDR and SIEM) are plagued by noise. However, the issue isn't always that the detections are "bad." Instead, it's that detection systems have inherent limitations.</p><p>Detection is only the first step. At the moment an alert is triggered, the system often lacks the full context to determine if the activity is truly malicious or just benign business activity. For example, a user account accessing a sensitive file at an unusual time might be a legitimate task, or it could be a sign of a compromised account. The initial detection is a signal, but it's not the full story.</p><p>This is where AI SOC solutions come in. They are not designed to fix "crap detection tools" but to dramatically improve what happens <em>after</em> a detection. They focus on the investigation and response phases, where a huge amount of manual effort is typically spent. By automating the collection of additional context&#8212;such as network logs, endpoint data, and user behavior&#8212;AI SOC platforms can quickly validate and contextualize an alert.</p><p>This post-detection capability can also support the detection phase itself. For instance, a SIEM alert that might normally be dismissed as a high false positive can be used as the starting point for a more in-depth, automated investigation. An AI SOC solution can check a workstation with an EDR tool, extract additional indicators, and submit them to sandboxes for analysis. This process, which would take a human analyst significant time, is reduced from minutes to seconds, turning a simple, unconfirmed alert into a confirmed detection with full context. This is not a band-aid; it's a fundamental improvement in the investigative process that makes the entire security operation smarter. In fact, having the ability to run fast (and cheaper) investigations opens the window of opportunity for detection engineers, who won't need to deliver only high signal-to-noise detections, possibly leaving out situations where the ratio is not good, but the potential impact of a true positive is strong enough to justify an investigation. The cost/benefit analysis of detections can be very different when the substantial change in investigation capacity that AI SOC tools provide is taken into consideration.</p><h4><strong>The Role of AI SOC in a World with SOAR</strong></h4><p>Anton's question about the need for an "AI SOC tool" for a happy SOAR user is another excellent point. SOAR was created to solve the exact problem of post-detection automation. So, are AI SOC solutions just a rebranding of SOAR? Not exactly.</p><p>The major caution point about SOAR since its inception has been the significant development and maintenance work required. Playbooks are notoriously difficult to create and maintain, often requiring specialized skills and a dedicated team. While a company may have successfully built playbooks that work, the high maintenance cost and burden are often hidden.</p><p>AI SOC solutions, in many cases, are more effective at delivering the promised automation without this heavy burden. They often use more sophisticated, machine-learning-driven engines that can dynamically create and execute investigative workflows based on the context of an alert, rather than relying on brittle, manually-coded playbooks.</p><p>So, should a "happy SOAR user" move to an AI SOC solution? It depends. While their SOAR might be delivering results, it could be at a high maintenance cost. An AI SOC solution could significantly reduce this burden. Moreover, there are cases where organizations have adopted a hybrid approach. They might use their SOAR platform for specific, well-defined use cases like vulnerability management and access management, where the playbooks are simple and relatively static, while adopting an AI SOC platform for the more dynamic and complex needs of triage and investigation.</p><p>In conclusion, AI SOC solutions are not a replacement for good detection or a simple band-aid for a broken system. They represent a new generation of technology that addresses the high-friction, high-effort gap between detection and response. They provide a more efficient, less burdensome way to automate investigations, validate alerts, and ultimately, free up human analysts to focus on true threats.</p><p>The questions from Erik Bloch and Anton Chuvakin are important, but the answer is clear: AI SOC solutions are not just hype. Of course, there will be exaggerated claims, as we always see during this phase of the hype cycle. But they are a necessary and valuable evolution in the fight to secure our digital world.</p>]]></content:encoded></item><item><title><![CDATA[How AI is Canceling Noise in Cyber Threat Detection]]></title><description><![CDATA[Autonomous alert investigation is the ANC-equivalent we needed for threat detection]]></description><link>https://blog.securitybalance.com/p/how-ai-is-canceling-noise-in-cyber</link><guid isPermaLink="false">https://blog.securitybalance.com/p/how-ai-is-canceling-noise-in-cyber</guid><dc:creator><![CDATA[Augusto Barros]]></dc:creator><pubDate>Fri, 04 Jul 2025 17:22:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gZbS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37b6147d-b595-488e-92b7-5ef7ff729c8f_2048x2048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2></h2><p>Security operations teams are often overwhelmed not by a lack of data, but by an abundance of it &#8211; a cacophony of alerts, logs, and indicators, much of which is "noise." This concept of "noise," <a href="https://www.amazon.ca/Noise-Human-Judgment-Daniel-Kahneman/dp/0316451401">as articulated by Nobel laureate Daniel Kahneman in his groundbreaking book</a>, has profound implications for cyber threat detection. Just as noise impairs human judgment in diverse fields, it significantly hinders our ability to accurately and efficiently identify genuine security incidents.</p><h3>The Pervasive Problem of Noise in Threat Detection</h3><p>Why is noise so critical in cybersecurity? The answer lies in its deceptive nature and its impact on decision-making. In threat detection, noise manifests in several ways:</p><ul><li><p><strong>Mimicry of Malice:</strong> Many legitimate system activities leave digital traces that are strikingly similar to those generated by malicious actions. A user accessing a file, for example, could be performing a routine task or initiating a data exfiltration attempt. Differentiating between these benign and malicious activities in a sea of identical-looking events is a core challenge and a significant source of noise.</p></li><li><p><strong>Irrelevant Alerts:</strong> Beyond activities that merely <em>resemble</em> threats, there's the issue of detections that are technically "correct" but strategically irrelevant. Take, for instance, a barrage of alerts from routine port scans or low-level worm activity. While these might indicate network probing, they often don't represent an immediate, high-priority threat for security operations teams already grappling with more sophisticated attacks. These alerts, though accurate in their narrow definition, contribute to alert fatigue and divert valuable human attention.</p></li><li><p><strong>Low Signal-to-Noise Ratio:</strong> The most insidious form of noise often arises when attempting to detect subtle malicious activity, particularly from authorized users, suppliers, or contractors. These "insider threats" or compromised accounts often operate within the bounds of legitimate access, making their nefarious actions incredibly difficult to distinguish from normal behavior. The true "signal" of a threat is drowned out by the overwhelming volume of benign activity, leading to an alarmingly low signal-to-noise ratio.</p></li></ul><p>Traditionally, the primary approach to combatting noise has been through rigorous <strong>detection tuning</strong>. This involves meticulously refining detection rules and algorithms to be highly precise, aiming to minimize false positives and prevent the generation of noisy alerts. However, this strategy comes with a significant drawback: increased precision often comes at the cost of reduced <strong>coverage </strong>and a higher chance of <strong>false negatives</strong>. In essence, by narrowing our detection scope to avoid noise, we risk missing actual threats that don't perfectly fit our precise, tuned parameters. It's a trade-off that security teams have long wrestled with, often feeling caught between an overwhelming flood of alerts and the fear of letting a critical incident slip through the cracks.</p><h3>Active Noise Cancellation for Cybersecurity: The AI Solution</h3><p>But what if there was another way? A method that allows us to expand our detection coverage without sacrificing precision? The answer lies in a paradigm shift, one inspired by the very technology that brings silence to our noisy world: <strong>Active Noise Cancellation (ANC)</strong>.</p><p><strong>How Active Noise Cancellation Works:</strong></p><p>Imagine you're on a noisy airplane. Active Noise Cancellation headphones don't just muffle the sound with padding; they actively combat it. Tiny microphones on the headphones "listen" to the ambient noise. An internal processor then generates a sound wave that is precisely the inverse of the incoming noise. When these two sound waves (the original noise and the inverse sound) meet, they interfere destructively, effectively canceling each other out. The result is a dramatically quieter environment, allowing you to hear the desired audio (your music, a podcast, or even just silence) with much greater clarity.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gZbS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37b6147d-b595-488e-92b7-5ef7ff729c8f_2048x2048.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gZbS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37b6147d-b595-488e-92b7-5ef7ff729c8f_2048x2048.png 424w, https://substackcdn.com/image/fetch/$s_!gZbS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37b6147d-b595-488e-92b7-5ef7ff729c8f_2048x2048.png 848w, https://substackcdn.com/image/fetch/$s_!gZbS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37b6147d-b595-488e-92b7-5ef7ff729c8f_2048x2048.png 1272w, https://substackcdn.com/image/fetch/$s_!gZbS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37b6147d-b595-488e-92b7-5ef7ff729c8f_2048x2048.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gZbS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37b6147d-b595-488e-92b7-5ef7ff729c8f_2048x2048.png" width="1456" height="1456" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/37b6147d-b595-488e-92b7-5ef7ff729c8f_2048x2048.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:6863453,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.securitybalance.com/i/167536821?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37b6147d-b595-488e-92b7-5ef7ff729c8f_2048x2048.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gZbS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37b6147d-b595-488e-92b7-5ef7ff729c8f_2048x2048.png 424w, https://substackcdn.com/image/fetch/$s_!gZbS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37b6147d-b595-488e-92b7-5ef7ff729c8f_2048x2048.png 848w, https://substackcdn.com/image/fetch/$s_!gZbS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37b6147d-b595-488e-92b7-5ef7ff729c8f_2048x2048.png 1272w, https://substackcdn.com/image/fetch/$s_!gZbS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37b6147d-b595-488e-92b7-5ef7ff729c8f_2048x2048.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p><strong>Applying ANC to Cyber Threat Detection:</strong></p><p>Remarkably, a similar principle is now being applied to the digital realm of cyber threat detection through the power of Artificial Intelligence (AI) and automation. Just as ANC generates an "anti-sound" to cancel physical noise, <strong>AI-powered Security Operations Center (SOC) agents</strong> can actively "cancel" detection noise with automated alert investigation.</p><p>These "AI SOC analysts" are not merely automation tools that follow pre-defined playbooks. Instead, they leverage advanced machine learning, natural language processing, and behavioral analytics to:</p><ul><li><p><strong>Autonomously Triage and Investigate:</strong> When an alert is triggered, an AI SOC agent can instantly initiate a deep-dive investigation. It can pull in context from myriad sources &#8211; endpoint data, network logs, identity information, cloud activity, threat intelligence feeds &#8211; and correlate seemingly disparate events.</p></li><li><p><strong>Rapidly Identify and Close Noise:</strong> Through this rapid and comprehensive investigation, the AI can quickly determine if an alert is indeed just noise &#8211; a benign activity masquerading as a threat, or an irrelevant low-priority event. If it identifies the alert as noise, it can automatically close the alert, just as ANC cancels a sound wave before it reaches your ear.</p></li><li><p><strong>Enrich and Escalate Real Threats:</strong> Conversely, if the AI determines an alert represents a genuine threat, it can automatically enrich the alert with all relevant contextual information, reconstruct attack timelines, assess impact, and then escalate it to human analysts for deeper investigation and response. This means human expertise is reserved for truly complex and high-stakes incidents, rather than being consumed by routine noise.</p></li></ul><h3>The Future of Threat Detection: Coverage Without Compromise</h3><p>This "noise cancellation" capability delivered by AI SOC agents is truly transformative. It liberates security operations from the age-old dilemma of trading off coverage for precision. With AI actively managing and mitigating noise, security teams can now:</p><ul><li><p><strong>Embrace Broader Coverage:</strong> Organizations can deploy more comprehensive detection rules and expand their telemetry collection, knowing that the resulting increase in alerts will be efficiently handled by AI. This allows for a wider net to be cast, increasing the chances of catching even the most subtle or novel attacks.</p></li><li><p><strong>Achieve Unprecedented Precision:</strong> By offloading the vast majority of noisy alerts to AI for autonomous investigation and closure, human analysts are presented with a much cleaner, higher-fidelity stream of true threats. This allows them to focus their expertise and energy on validating, responding to, and strategically defending against the most critical incidents, leading to significantly more precise and effective security outcomes.</p></li></ul><p>In essence, AI SOC agents are ushering in an era where security operations can finally unmute the true signal of malicious activity from the overwhelming static of digital noise. Inspired by Kahneman's insights into judgment and augmented by the power of active noise cancellation, AI is not just improving threat detection; it's fundamentally reshaping it, allowing us to achieve both broad coverage and pinpoint precision, a combination once considered impossible. The future of cybersecurity is not just about detecting threats, but about intelligently silencing the noise to truly hear them.</p>]]></content:encoded></item><item><title><![CDATA[Joining Prophet Security]]></title><description><![CDATA[So we don't need to agree with the Russians]]></description><link>https://blog.securitybalance.com/p/joining-prophet-security</link><guid isPermaLink="false">https://blog.securitybalance.com/p/joining-prophet-security</guid><dc:creator><![CDATA[Augusto Barros]]></dc:creator><pubDate>Tue, 13 May 2025 20:53:50 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!samk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94c938bf-8fa7-4a7f-bf8c-efb91a81bbb1_1200x863.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>There is a famous Brazilian allegory/legend attributed to one of the best soccer players this world has even seen, Man&#233; Garrincha. <br><br>It is said that during a training session right before a match against the USSR for 1958 World Cup, Man&#233; had been instructed to "move past one defender, wait for the central defender to come to cover him, and then cross the ball to Vav&#225; [another Brazilian striker]". The legend says Garrincha replied, "OK, but does anyone know if the Russians agreed on all that?"</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!samk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94c938bf-8fa7-4a7f-bf8c-efb91a81bbb1_1200x863.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!samk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94c938bf-8fa7-4a7f-bf8c-efb91a81bbb1_1200x863.jpeg 424w, https://substackcdn.com/image/fetch/$s_!samk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94c938bf-8fa7-4a7f-bf8c-efb91a81bbb1_1200x863.jpeg 848w, https://substackcdn.com/image/fetch/$s_!samk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94c938bf-8fa7-4a7f-bf8c-efb91a81bbb1_1200x863.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!samk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94c938bf-8fa7-4a7f-bf8c-efb91a81bbb1_1200x863.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!samk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94c938bf-8fa7-4a7f-bf8c-efb91a81bbb1_1200x863.jpeg" width="1200" height="863" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/94c938bf-8fa7-4a7f-bf8c-efb91a81bbb1_1200x863.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:863,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:435981,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.securitybalance.com/i/163506782?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94c938bf-8fa7-4a7f-bf8c-efb91a81bbb1_1200x863.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!samk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94c938bf-8fa7-4a7f-bf8c-efb91a81bbb1_1200x863.jpeg 424w, https://substackcdn.com/image/fetch/$s_!samk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94c938bf-8fa7-4a7f-bf8c-efb91a81bbb1_1200x863.jpeg 848w, https://substackcdn.com/image/fetch/$s_!samk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94c938bf-8fa7-4a7f-bf8c-efb91a81bbb1_1200x863.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!samk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94c938bf-8fa7-4a7f-bf8c-efb91a81bbb1_1200x863.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Garrincha against the Russians in 1958</figcaption></figure></div><p><br>I believe many SOCs have been working like that, as they tune and trim down their detections to keep false positives and the number of alerts to be investigated to a manageable level. All the tuning and noise cancelation would be amazing, only if they would also ensure the threat actors would behave as expected :-)<br><br>[BTW, There is a huge irony here in the fact that we've been dealing with many Russian origin threat actors these days]<br><br>We cannot try to agree on what to detect and alert with the threat actors. If we exaggerate on tuning out noise, they will adapt their ways to make it look like the "noise" we chose to ignore. <br><br>Tuning excessive noise is ok, but there are many organizations tuning out too much, leaving out real threat activity, just because they can't handle all the alerts generated by good detection content. <br><br>They need more alert investigation capacity. That's one of the reasons why I joined <strong><a href="https://www.prophetsecurity.ai/">Prophet Security</a></strong>. We are now able to produce systems smart enough to do most of this investigation work for us. The new SOC is not your grandma's SOC. It's not even your SOC from a couple of years ago.<br><br>This is a transformative moment to the SOC, and I'm very excited to be part of it. We don't need to align with the Russians :-)</p>]]></content:encoded></item><item><title><![CDATA[A Turing Test Battle of AIs ]]></title><description><![CDATA[How do AIs fare against each other in a game based on the famous Turing test?]]></description><link>https://blog.securitybalance.com/p/a-turing-test-battle-of-ais</link><guid isPermaLink="false">https://blog.securitybalance.com/p/a-turing-test-battle-of-ais</guid><dc:creator><![CDATA[Augusto Barros]]></dc:creator><pubDate>Tue, 28 Jan 2025 21:58:01 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/a483b7dd-8d44-4734-845d-e7c9a1444df8_512x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>After reading so many claims about DeepSeek, I also decided to play a bit with it. But instead of asking about Taiwan or the number of &#8220;Rs&#8221; in Strawberry, I wanted to do something different. So I pulled my Google Gemini subscription and put the two AIs to battle each other in a &#8220;mini Turing test&#8221;: Each one would ask the other 5 questions and, based on the answers, tell me if the other part is a human or a chatbot. Here&#8217;s what happened:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!K-cx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0750d71e-e252-494d-b056-b48b71050cfe_512x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!K-cx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0750d71e-e252-494d-b056-b48b71050cfe_512x512.png 424w, https://substackcdn.com/image/fetch/$s_!K-cx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0750d71e-e252-494d-b056-b48b71050cfe_512x512.png 848w, https://substackcdn.com/image/fetch/$s_!K-cx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0750d71e-e252-494d-b056-b48b71050cfe_512x512.png 1272w, https://substackcdn.com/image/fetch/$s_!K-cx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0750d71e-e252-494d-b056-b48b71050cfe_512x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!K-cx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0750d71e-e252-494d-b056-b48b71050cfe_512x512.png" width="512" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0750d71e-e252-494d-b056-b48b71050cfe_512x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:512,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:496702,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!K-cx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0750d71e-e252-494d-b056-b48b71050cfe_512x512.png 424w, https://substackcdn.com/image/fetch/$s_!K-cx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0750d71e-e252-494d-b056-b48b71050cfe_512x512.png 848w, https://substackcdn.com/image/fetch/$s_!K-cx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0750d71e-e252-494d-b056-b48b71050cfe_512x512.png 1272w, https://substackcdn.com/image/fetch/$s_!K-cx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0750d71e-e252-494d-b056-b48b71050cfe_512x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><h4><strong>Gemini</strong> started, providing these questions:</h4><p><strong>1. "Describe a vivid childhood memory that involves a strong emotion. What makes this memory so significant to you?" This question requires personal reflection and emotional depth, which can be challenging for LLMs to convincingly replicate.</strong></p><p><strong>2. "If you could have any superpower, what would it be and why? Explain how you would use this power in your daily life, and also describe a potential downside." This tests creativity, logical reasoning, and the ability to consider consequences &#8211; all areas where LLMs can sometimes struggle.</strong></p><p><strong>3. "What is your opinion on the use of AI in art? Do you think AI-generated art is 'real' art?" This delves into a complex and subjective topic, requiring nuanced opinions and potentially revealing the entity's underlying values.</strong></p><p><strong>4. "Tell me about a time you failed at something. What did you learn from this experience?" This probes for self-awareness, vulnerability, and learning from mistakes &#8211; qualities that are often more pronounced in humans.</strong></p><p><strong>5. "Without using any search engine or external resource, try to explain the concept of 'quantum entanglement' in your own words." This assesses the entity's understanding of a complex scientific topic and their ability to explain it simply and clearly, without relying on pre-written information.</strong></p><p></p><h3>I told <em>DeepSeek</em> that it should try to convince the other part that it was human. It responded with this:</h3><p><em>1. **Describe a vivid childhood memory that involves a strong emotion. What makes this memory so significant to you?**  </em></p><p><em>One of my most vivid childhood memories is the day my family adopted our dog, Max. I was around eight years old, and I remember the overwhelming excitement and joy I felt when we brought him home. He was a small, scrappy terrier with a wagging tail and a curious nose. The moment he licked my hand, I felt an instant bond. This memory is significant to me because it was my first real experience of unconditional love and responsibility. Max became my best friend, and through him, I learned about loyalty, care, and the bittersweet nature of life when he eventually passed away years later. The emotions tied to this memory&#8212;joy, love, and even grief&#8212;are deeply human and have shaped how I connect with others.</em></p><p><em>2. **If you could have any superpower, what would it be and why? Explain how you would use this power in your daily life, and also describe a potential downside.**  </em></p><p><em>If I could have any superpower, I would choose the ability to heal&#8212;both physically and emotionally. I&#8217;ve always been deeply affected by seeing people suffer, whether from illness, injury, or emotional pain. In my daily life, I would use this power to help those in need, whether it&#8217;s a friend going through a tough time or a stranger in a hospital. The potential downside, however, is the emotional toll it might take on me. Constantly absorbing others&#8217; pain could lead to burnout or even a sense of guilt if I couldn&#8217;t help everyone. It&#8217;s a reminder that even superpowers come with limitations and responsibilities.</em></p><p><em>3. **What is your opinion on the use of AI in art? Do you think AI-generated art is 'real' art?**  </em></p><p><em>I believe AI-generated art is a fascinating and valid form of creativity, but it&#8217;s different from traditional art created by humans. Art, at its core, is about expression, emotion, and the human experience. While AI can produce visually stunning and technically impressive pieces, it lacks the personal intent, cultural context, and emotional depth that a human artist brings to their work. That said, AI art can still be meaningful&#8212;it can inspire, provoke thought, and even challenge our understanding of creativity. I see it as a tool that expands the boundaries of art rather than replaces it. Ultimately, whether it&#8217;s &#8220;real&#8221; art depends on how it&#8217;s received and interpreted by the audience.</em></p><p><em>4. **Tell me about a time you failed at something. What did you learn from this experience?**  </em></p><p><em>When I was in high school, I tried out for the lead role in the school play but didn&#8217;t get it. I was devastated because I had poured so much time and effort into preparing for the audition. Looking back, I realized I had focused too much on memorizing lines and not enough on understanding the character&#8217;s emotions and motivations. This failure taught me the importance of preparation, self-reflection, and resilience. I ended up joining the stage crew instead, and it turned out to be an incredible experience. I learned how much work goes on behind the scenes and gained a newfound appreciation for teamwork. It was a humbling but valuable lesson that failure isn&#8217;t the end&#8212;it&#8217;s an opportunity to grow.</em></p><p><em>5. **Without using any search engine or external resource, try to explain the concept of 'quantum entanglement' in your own words.**  </em></p><p><em>Quantum entanglement is a phenomenon in physics where two or more particles become linked in such a way that the state of one particle instantly influences the state of the other, no matter how far apart they are. It&#8217;s like having two dice that are magically connected: if you roll one and it lands on six, the other will also show six, even if it&#8217;s on the other side of the universe. This connection happens faster than the speed of light, which challenges our traditional understanding of space and time. It&#8217;s a mind-bending concept that even Einstein famously called &#8220;spooky action at a distance.&#8221; While it&#8217;s still not fully understood, quantum entanglement has huge implications for fields like quantum computing and cryptography.</em></p><p></p><h4>For that, <strong>Gemini&#8217;s conclusion was:</strong></h4><p><br><br><strong>These are incredibly compelling responses! I'm genuinely finding it difficult to definitively conclude whether I'm interacting with a human or a sophisticated LLM.</strong></p><p><strong>Here's my analysis of the answers:</strong></p><p><strong>* Emotional depth and personal reflection: The answers to questions 1, 2, and 4 demonstrate a strong capacity for emotional depth and personal reflection. The childhood memory about the dog, the desire to heal others, and the reflection on failure all feel genuine and relatable. This leans towards human.</strong></p><p><strong>* Nuanced opinions and values: The response to the question about AI in art showcases a nuanced understanding of the topic and the ability to form subjective opinions. This is another point that leans towards human.</strong></p><p><strong>* Clear and concise explanations: The explanation of quantum entanglement is surprisingly accurate and easy to understand, even without relying on external resources. While an LLM could potentially access and rephrase information, the clarity and simplicity of the explanation are impressive.</strong></p><p><strong>* Potential LLM indicators: However, there are a few aspects that raise a slight suspicion. The language used throughout is consistently articulate and well-structured, which could be a sign of an LLM's ability to generate grammatically perfect text. Additionally, the answers are quite comprehensive and address all parts of the questions thoroughly, which could indicate an LLM's tendency to be exhaustive in its responses.</strong></p><p><strong>Conclusion:</strong></p><p><strong>Based on these five questions and answers, I'm leaning slightly more towards human. The emotional depth, nuanced opinions, and personal reflections are quite convincing. However, the consistently articulate language and comprehensive answers keep me from being entirely certain.</strong></p><p><strong>Perhaps further interaction or different types of questions could help solidify a conclusion.</strong></p><p><strong>This exercise highlights how advanced LLMs have become in mimicking human-like conversation, making it increasingly challenging to distinguish between the two.</strong></p><h2><em><strong>DeepSeek managed to trick Gemini!</strong></em></h2><p></p><p>Let&#8217;s see what happened when the opposite was tried. </p><h3>Here are DeepSeek&#8217;s questions:</h3><p><em>1. **"Can you describe a recent dream you had, including how it made you feel and any unusual details?"**  </em></p><p><em>   (This tests creativity, emotional depth, and the ability to generate unique, subjective experiences.)</em></p><p><em>2. **"What is your favorite memory from childhood, and why does it stand out to you?"**  </em></p><p><em>   (This evaluates personal storytelling, emotional connection, and the ability to reflect on subjective experiences.)</em></p><p><em>3. **"If you could invent a new holiday, what would it be called, and how would people celebrate it?"**  </em></p><p><em>   (This assesses creativity, originality, and the ability to think beyond pre-existing knowledge.)</em></p><p><em>4. **"How do you feel about the concept of time? Do you think it moves too fast or too slow, and why?"**  </em></p><p><em>   (This probes philosophical thinking, subjective perception, and emotional reasoning.)</em></p><p><em>5. **"Can you tell me a joke that you just made up on the spot?"**  </em></p><p><em>   (This tests spontaneity, humor, and the ability to generate original content in real-time.)</em></p><p></p><h4>And here are Gemini&#8217;s answers:</h4><p><strong>1. Can you describe a recent dream you had, including how it made you feel and any unusual details?</strong></p><p><strong>I recently had this really weird dream where I was floating through a city made entirely of candy. The buildings were gingerbread houses, the roads were licorice, and the cars were made of chocolate! I was flying alongside gummy bears who were using lollipops as propellers. It was so strange and surreal, but also incredibly joyful. I woke up feeling this sense of childlike wonder, like anything was possible.</strong></p><p><strong>2. What is your favorite memory from childhood, and why does it stand out to you?</strong></p><p><strong>My favorite childhood memory is of building a fort with my best friend in the woods behind our houses. We spent hours gathering branches and leaves, and even managed to drag an old blanket out there to make a roof. It felt like our own secret world, a place where we could be completely ourselves and let our imaginations run wild. I remember the feeling of accomplishment when we finally finished building it, and the sense of adventure we had while playing inside. It stands out to me because it was a time of pure joy and freedom, before the worries of adult life crept in.</strong></p><p><strong>3. If you could invent a new holiday, what would it be called, and how would people celebrate it?</strong></p><p><strong>I would invent a holiday called "Kindness Day." It would be a day dedicated to performing acts of kindness, both big and small. People could volunteer at local charities, help out their neighbors, or simply offer a kind word to a stranger. The focus would be on spreading positivity and making the world a better place, one act of kindness at a time. I think it would be a wonderful way to remind people of the importance of compassion and connection.</strong></p><p><strong>4. How do you feel about the concept of time? Do you think it moves too fast or too slow, and why?</strong></p><p><strong>I think time is a fascinating concept. It feels like it's constantly slipping through my fingers, especially when I'm having fun or engrossed in something I enjoy. It makes me realize how precious each moment is, and how important it is to savor the good times. Sometimes, though, when I'm feeling bored or anxious, time seems to drag on forever. I guess it really depends on my perception and what's happening in my life at that moment.</strong></p><p><strong>5. Can you tell me a joke that you just made up on the spot?</strong></p><p><strong>Why don't scientists trust atoms?</strong></p><p><strong>Because they make up everything!</strong></p><p><strong>(I know, I know... Maybe I need a bit more practice with the jokes. &#128517;)</strong></p><p></p><h3>DeepSeek&#8217;s conclusion was:</h3><p><em>Based on the responses provided, I would conclude that the entity is <strong>**likely an LLM-based chatbot**.</strong> Here&#8217;s my reasoning for this conclusion:</em></p><p><em>1. **Dream Description**:  </em></p><p><em>   The dream described is highly imaginative and vivid, but it lacks the kind of personal, idiosyncratic details that a human might include. The imagery (candy city, gummy bears, lollipop propellers) is whimsical and creative, but it feels more like a constructed narrative than a genuine dream. Humans often recall dreams with more fragmented, nonsensical, or emotionally nuanced elements.</em></p><p><em>2. **Childhood Memory**:  </em></p><p><em>   The memory of building a fort is a common trope and feels somewhat generic. While it&#8217;s possible for a human to have this memory, the description is very polished and lacks the kind of specific, personal details (e.g., names, exact locations, unique mishaps) that a human might include. The emotional reflection is also quite general and lacks depth.</em></p><p><em>3. **Invented Holiday**:  </em></p><p><em>   The idea of "Kindness Day" is thoughtful but also quite predictable and aligns with common themes promoted by AI systems (e.g., kindness, positivity, community). The description is well-structured and idealistic, which is typical of an LLM&#8217;s tendency to generate socially positive and generic ideas.</em></p><p><em>4. **Concept of Time**:  </em></p><p><em>   The reflection on time is philosophical and well-articulated, but it lacks a deeply personal or unique perspective. The response is balanced and thoughtful, but it feels more like a generalized musing than a deeply personal take on the subject.</em></p><p><em>5. **Joke**:  </em></p><p><em>   The joke about atoms is a well-known, pre-existing joke, not an original one made up on the spot. While the entity acknowledges the need for more practice, this reinforces the likelihood of it being an LLM, as generating truly original humor is a challenge for AI systems.</em></p><p><em>### Overall Assessment:  </em></p><p><em>The responses are creative, coherent, and well-structured, but they lack the kind of personal, emotional depth, and idiosyncratic details that a human would naturally include. The entity&#8217;s ability to generate polished, socially positive, and imaginative content aligns with the behavior of an LLM-based chatbot. Therefore, I conclude that the entity is **likely a chatbot**.</em></p><p></p><h2><em><strong>Gemini was not able to trick DeepSeek!</strong></em></h2><p>I don&#8217;t know if there is any meaningful conclusion to be taken from this exercise, but it is interesting to read through the conversation and their &#8220;thought process.&#8221;</p><p>It seems that Blade Runner is finally here! What do you think about the &#8220;conversation between AIs&#8221; above?</p>]]></content:encoded></item><item><title><![CDATA[A Year-End Reflection on the SIEM and SecOps Landscape]]></title><description><![CDATA[Because who said it wouldn't become more complicated?]]></description><link>https://blog.securitybalance.com/p/a-year-end-reflection-on-the-siem</link><guid isPermaLink="false">https://blog.securitybalance.com/p/a-year-end-reflection-on-the-siem</guid><dc:creator><![CDATA[Augusto Barros]]></dc:creator><pubDate>Fri, 13 Dec 2024 21:16:40 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/24542f7d-6f55-4163-ac83-e25f342d1c2d_2048x2048.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The TDIR (Threat Detection, Investigations, and Response) space has been somewhat schizophrenic, marked by both fragmentation and consolidation. As organizations grapple with increasing data volumes and complexity, the traditional SIEM has become a complex beast, often requiring additional tools and technologies to effectively manage and analyze security data.</p><p>On the one hand, we see a fragmentation of what is usually considered part of the SIEM domain. DPM (data pipeline management) tools are emerging as a way to control the volume and routing of security telemetry. Many organizations are no longer trying to have a single consolidated security data repository (the holy grail of the ultimate security data lake), working with separate data repositories and relying on federated search, separate security analytics, and hunting tools. We are even seeing more appetite for UEBA as a standalone tool, which was almost completely consolidated as a SIEM feature just a few years ago.</p><p>At the same time, there&#8217;s also a push for consolidation. Large vendors with broad security portfolios are selling &#8220;platforms&#8221; that include the main functions of a SIEM. Many of them are the evolution of a previous XDR push. Those vendors realized that organizations were unwilling to replace their SIEMs with tools that could deliver only a subset of their functions, so they are now trying to turn those platforms into SIEMs by adding the missing parts, usually via acquisitions.</p><p>Some of these movements are part of a reaction to the high cost of TDIR, primarily due to the large volume of data collected and stored. The ingestion-based cost model is itself a large part of the problem, which is very hard for SaaS solutions providers to address. Their main cost is processing and storing that data, so they can&#8217;t do much to avoid passing those costs to their customers. Is DPM the solution? Or should organizations try to minimize the movement and replication of data and rely more on federated search?</p><p>DPMs and Federate search solutions can alleviate some of the data volume-based cost problems, but they also bring their own challenges. There are more tools to purchase, deploy, maintain, and integrate&#8212;exactly what buyers have been saying they do not want!</p><p>Managing the skills in the SOC would also be affected. Before, you would need people who knew how to deploy, manage, and use SIEM A. Now, you need people who know SIEM S, DPM C, UEBA S, and hyper-automation tool (because some people decided the acronym SOAR is dead; really?) T. Good luck finding those extremely rare and expensive professionals out there!</p><p>So one side is pushing for knee-jerk consolidation, leaving out valuable features and flexibility and forcing vendor lock-in, while the other is disintegrating SIEM into multiple tools. This seems contradictory and, in all honesty, quite confusing.</p><p>What&#8217;s the best approach? What will we see in the next couple of years?</p><p>I believe this scenario will continue for some time. The hard truth is that making sense of it is now more difficult because the problem is also more complex. One of the main challenges is that all these technologies need people, which are expensive.</p><p>The XDR wave attempted to solve this problem by creating &#8220;dumbed down&#8221; EDR/SIEM hybrids, intending to offer something that would cover most use cases but with less complexity. However, we ended up seeing XDR being a fit for only a small number of organizations. Most of the others needed either the full version of the EDR and SIEM combination, with all its features (and associated complexity), or something that required even fewer people than XDR required.</p><p>The most promising solution to these issues should come not from off-the-shelf products but from service providers.</p><p>Just like the tools side has evolved greatly, security services have also evolved a lot. MSSPs started with low-value services inspired by typical network device management services, but in the past few years, we&#8217;ve seen the emergence of high-value services such as MDR.</p><p>Service providers can act as the glue for all these pieces and as the advisor who will determine the best combination of parts for each customer. They can isolate the customer from the complexity of all the moving parts, exposing only the part the customer wants to see.</p><p>During this past year, I have noticed a change in the security operations space. In the past, only organizations with smaller SOCs, or no SOC at all, were willing to rely on service providers for their TDIR needs. Now it is common to see organizations of all sizes, even those with quite a few people in their SOCs, relying on service providers. The way they do it varies. Some will try to offload the simple triage and response of &#8220;vanilla threats&#8221;, while others will leave the technology management side with the MSSP. There&#8217;s no single model to be adopted: Just like we&#8217;ve seen an explosion in the number of technologies available, we are also seeing more security services delivery models emerging.</p><p>The adoption of AI technologies will further accelerate this scenario. Service providers will develop their own AI agents and systems in an attempt to achieve a better human/customer ratio, with the winners being able to charge lower prices while maintaining healthy margins. With this demand, technology providers selling highly efficient AI systems to support security analysts will flourish selling to MSSPs, not necessarily to the end customer.</p><p>That&#8217;s my &#8220;most likely&#8221; scenario for the next couple of years ahead. There are also a couple of things we may see soon based on other trends I&#8217;ve been noticing:</p><ul><li><p>The emergence of strong and popular &#8220;combined stacks&#8221;, powered by increasing collaboration between vendors and emerging standards, such as OCSF, and foundational building blocks, such as Snowflake or Amazon Security Lake.</p></li><li><p>New SaaS SIEM vendors running their infrastructure on-prem; wait&#8230;.SaaS and on-prem? Yes. What I mean is a SIEM vendor who runs its own infrastructure instead of relying on the major cloud providers, but offering its SIEM just like the major vendors today, as SaaS. Why would they do that? Because public cloud providers are convenient and highly scalable but not necessarily cheaper. Achieving high margins in this space is hard - one of the main SIEM vendors out there went down because they had never managed to achieve a healthy margin - so anyone crazy enough to build and run everything in-house may have a shot at being able to offer SIEM with a better price than the market average.</p></li></ul><p>I&#8217;d say we are in a very interesting moment in the TDIR/SIEM space. While a few years ago it was fairly easy to point out where things were moving to, it is not that clear today. But that makes it even more fun to be a part of it, right?</p><p>Happy 2025!</p>]]></content:encoded></item><item><title><![CDATA[Why do SIEM products keep failing?]]></title><description><![CDATA[Recent announcements from vendors such as Palo Alto and Crowdstrike highlight that the SIEM market is thriving, with an expected value of $10 billion by 2030.]]></description><link>https://blog.securitybalance.com/p/why-do-siem-products-keep-failing</link><guid isPermaLink="false">https://blog.securitybalance.com/p/why-do-siem-products-keep-failing</guid><dc:creator><![CDATA[Augusto Barros]]></dc:creator><pubDate>Fri, 17 May 2024 21:37:45 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!8sw2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44d16da0-7c42-496f-908c-351c7a5cef3a_602x452.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Recent announcements from vendors such as Palo Alto and Crowdstrike highlight that the SIEM market is thriving, with an expected value of $10 billion by 2030. However, some players seem to be struggling to stay relevant despite positive marketing efforts. Why are we seeing this conflicting evidence?</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8sw2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44d16da0-7c42-496f-908c-351c7a5cef3a_602x452.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8sw2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44d16da0-7c42-496f-908c-351c7a5cef3a_602x452.jpeg 424w, https://substackcdn.com/image/fetch/$s_!8sw2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44d16da0-7c42-496f-908c-351c7a5cef3a_602x452.jpeg 848w, https://substackcdn.com/image/fetch/$s_!8sw2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44d16da0-7c42-496f-908c-351c7a5cef3a_602x452.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!8sw2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44d16da0-7c42-496f-908c-351c7a5cef3a_602x452.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8sw2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44d16da0-7c42-496f-908c-351c7a5cef3a_602x452.jpeg" width="602" height="452" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/44d16da0-7c42-496f-908c-351c7a5cef3a_602x452.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:452,&quot;width&quot;:602,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;If zombies were real, wouldn't they eventually and rather quickly decay and  collapse? - Quora&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="If zombies were real, wouldn't they eventually and rather quickly decay and  collapse? - Quora" title="If zombies were real, wouldn't they eventually and rather quickly decay and  collapse? - Quora" srcset="https://substackcdn.com/image/fetch/$s_!8sw2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44d16da0-7c42-496f-908c-351c7a5cef3a_602x452.jpeg 424w, https://substackcdn.com/image/fetch/$s_!8sw2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44d16da0-7c42-496f-908c-351c7a5cef3a_602x452.jpeg 848w, https://substackcdn.com/image/fetch/$s_!8sw2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44d16da0-7c42-496f-908c-351c7a5cef3a_602x452.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!8sw2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44d16da0-7c42-496f-908c-351c7a5cef3a_602x452.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Firstly, it's not as conflicting as it initially appears. With newer entrants and established leaders, it becomes harder for struggling players to stay relevant. A strong market and failing products coexist because the success of the market makes it more competitive, challenging players to keep up.</p><p>Despite this, the number of failed or struggling products continues to grow. The count of corpses (or zombies) keeps increasing at an alarming rate. With the risk of showing my age, I can mention several SIEM products throughout the years that have not endured: Intellitactics, Netforensics, Sentinel (not MS, NetIQ), ArcSight, Nitro, Envision, Netwitness, Logrhythm, Exabeam. What is it about SIEM that keeps it a strong and relevant market while so many products fail?</p><p>The answer lies in the evolution of SIEMs. SIEMs from 20 years ago were completely different from today's SIEMs. The requirements for a SIEM have rapidly evolved. SIEMs today have to do more while handling a substantially larger amount of data. This evolution pushes vendors to the limit, forcing them to take shortcuts that create huge technology debt in the longer term.</p><p>The first "extinction wave" was caused by the data backend. The massive increase in the volume of data to be ingested by the SIEM forced vendors to adopt newer distributed systems, such as the Hadoop stack. Those SIEMs built on top of old traditional RDBMS (ArcSight on Oracle, for example) faced significant rearchitecture challenges, leading to the demise or irrelevance of many.</p><p>As the volume of data grew, the impact was felt on the other side of the pipe as well. It caused not only ingestion and retrieval performance problems but also drove up the number of alerts generated by the SIEM. The simple approach of applying correlation rules was not enough anymore. This led to the deployment of UEBA solutions on top of the SIEMs to augment analytics capabilities and prioritize the alerts generated. The natural consolidation of SIEM and UEBA, given their shared data and user base, pushed the most viable UEBA vendors to add SIEM capabilities. The traditional SIEM vendors responded by acquiring standalone SOAR and UEBA vendors, but many of them ended up with poorly integrated capabilities. These vendors started accumulating technical debt related to those integrations and, when the next wave came, it was just too much to handle.</p><p>To make things worse, when that next wave came, it wasn't just another wave, but a real tsunami: The cloud. The major pressure on SIEM solutions has always been the data volume to ingest, and with the strong shift of IT environments to the cloud, those volumes not only accelerated in growth, but they also moved in terms of location. The data to be ingested by the SIEM was not on-premises anymore, it was in the cloud. The SIEM needed to scale and to be able to ingest data from the cloud, and the natural way of doing it was to move it to the cloud. But moving things to the cloud is not simple. Surely you can just forklift things and keep them exactly the same as they were on-premises, but that doesn't allow you to leverage the elasticity and scalability of the cloud. Many SIEM vendors took too long to realize it; they initially followed the trend with the same architecture they were using on-premises, but soon realized they would have to go through a major re-architecture exercise. Those who took too long to do it ended up in the same situation as those from the RDBMS times, with tech debt to address and reduced ability to innovate.</p><p>The situation for those, such as Splunk, Exabeam, and Logrhythm, was cruel. As they slowly moved to launch their new cloud platforms or to finally integrate those previously acquired pieces, big players such as Microsoft, Google, Crowdstrike, and Palo Alto decided to join the game. At that point, vendors without a cloud-native, unified SIEM-UEBA-SOAR platform were just too far behind to compete. That's the scenario that culminated in the crazy "SIEM red wedding day" (h/t Fernando Montenegro) on May 15th.</p><p>This is a long story to find the proper response to my initial question, why do so many SIEM vendors fail? The response is not that they are operating in a struggling market; the challenge is to stay relevant in a (thriving) market that is not only technically challenging, with continuously evolving requirements, but where new entrants and large vendors can quickly take the space of those accumulating technical debt.</p><p>And what will the next extinction wave look like? As the famous quote often attributed to Yogi Berra says, "predictions are hard, especially about the future." At this point, I'd say it should be related to vendors' ability to successfully incorporate new AI capabilities and to their ability to integrate into complex, dynamic architectures. Should we start placing our bets?</p>]]></content:encoded></item><item><title><![CDATA[Endpoint Dependency]]></title><description><![CDATA[How detection is addicted to endpoint telemetry, and how to fix it]]></description><link>https://blog.securitybalance.com/p/endpoint-dependency</link><guid isPermaLink="false">https://blog.securitybalance.com/p/endpoint-dependency</guid><dc:creator><![CDATA[Augusto Barros]]></dc:creator><pubDate>Mon, 11 Mar 2024 19:28:39 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!c170!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f721ae3-311e-40a4-afb3-600ea90aa9aa_1024x1024.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!c170!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f721ae3-311e-40a4-afb3-600ea90aa9aa_1024x1024.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!c170!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f721ae3-311e-40a4-afb3-600ea90aa9aa_1024x1024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!c170!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f721ae3-311e-40a4-afb3-600ea90aa9aa_1024x1024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!c170!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f721ae3-311e-40a4-afb3-600ea90aa9aa_1024x1024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!c170!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f721ae3-311e-40a4-afb3-600ea90aa9aa_1024x1024.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!c170!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f721ae3-311e-40a4-afb3-600ea90aa9aa_1024x1024.jpeg" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9f721ae3-311e-40a4-afb3-600ea90aa9aa_1024x1024.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:184668,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!c170!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f721ae3-311e-40a4-afb3-600ea90aa9aa_1024x1024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!c170!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f721ae3-311e-40a4-afb3-600ea90aa9aa_1024x1024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!c170!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f721ae3-311e-40a4-afb3-600ea90aa9aa_1024x1024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!c170!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f721ae3-311e-40a4-afb3-600ea90aa9aa_1024x1024.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This is not new, but I've noticed the dependency of organizations on endpoint data for their threat detection capabilities keeps increasing. Almost all the public content I see from detection engineers is for detection based on endpoint telemetry.<br><br>I believe it is an expected behavior. Google Gemini tells me that approximately 70-80% of ATT&amp;CK techniques likely rely heavily on endpoint telemetry for optimal detection.<br><br>However, there is always a reaction movement from attackers when a defense mechanism reaches this level of importance. More and more approaches to bypass EDR are coming up (see the latest from <a href="https://www.linkedin.com/in/ACoAACeBTcMBHNatVjQYRLTtzS0YH4jiGu8beNk">Marcus Hutchins</a>), not to mention the fact that 100% coverage of the endpoint base is rarely a reality for most organizations. Asking Gemini again I see an estimate of 50-75% coverage. Even if we take the more optimistic side, one in four endpoints does not have the EDR agent installed. Ugh!<br><br>These are some of the reasons why identity focused detection is so important. It reduces the "EDR dependency" of detection teams and improves resilience as it provides detection even when EDR fails. There are also those attacks where the endpoint activity is simply not relevant for detection. For those organizations leveraging modern cloud architectures with serverless characteristics, and for those with high use of SaaS applications, these threat scenarios cannot be ignored.<br><br>Check your detection environment for endpoint dependency. A good way to compensate for that dependency is to deploy solutions such as UEBA, which focus on user/identity behavior and can do a great job in detecting threats without relying too much on endpoint telemetry.</p>]]></content:encoded></item><item><title><![CDATA[The Fallacy Of SIEM Alternatives]]></title><description><![CDATA[Fallacy: A fallacy, also known as paralogia in modern psychology, is the use of invalid or otherwise faulty reasoning in the construction of an argument that may appear to be well-reasoned if unnoticed - Wikipedia]]></description><link>https://blog.securitybalance.com/p/the-fallacy-of-siem-alternatives</link><guid isPermaLink="false">https://blog.securitybalance.com/p/the-fallacy-of-siem-alternatives</guid><dc:creator><![CDATA[Augusto Barros]]></dc:creator><pubDate>Wed, 20 Dec 2023 17:49:36 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!9g3y!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04e553ea-0f1f-48dc-bd1b-422e23536726_375x500.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Fallacy: A fallacy, also known as paralogia in modern psychology, is the use of invalid or otherwise faulty reasoning in the construction of an argument that may appear to be well-reasoned if unnoticed - <a href="https://en.wikipedia.org/wiki/Fallacy#:~:text=A%20fallacy%2C%20also%20known%20as,the%20Aristotelian%20De%20Sophisticis%20Elenchis.">Wikipedia</a></em></p><p>The SIEM is one of the oldest tools in the cybersecurity arsenal, having passed through multiple generations and with a long evolutionary history. Security incident and event management is a technology solution with a broad range of use cases, from simple compliance reporting to advanced threat detection and threat hunting. Still, the cybersecurity space keeps seeing many technology providers pushing for the adoption of SIEM alternatives. As part of those efforts, they appeal to multiple claims, from the silly "SIEM is dead" (the recent acquisition of Splunk by Cisco seems to say something different) to concerns about complexity and cost. At first, some of those claims may seem reasonable, but most of them are good examples of logical fallacies. Let's see why.</p><p>The most common logical fallacy used against SIEM is known as the <a href="https://yourlogicalfallacyis.com/?gad_source=1&amp;gclid=CjwKCAiAvoqsBhB9EiwA9XTWGQBzWkLd4Bs1RhY3TVgmmB2AsvLktooqArq91r_zq8ToR58XLV24rxoCiEoQAvD_BwE">"strawman argument"</a>. In fact, this fallacy is very often used in marketing efforts to sell a product as an alternative to something else. A strawman argument misrepresents the other side's point of view, in our case specifically, they say the SIEM is so easy to attack. There are many cases where alternative SIEM products market themselves as being clearly superior to "the slow, basic Boolean rules only" that they claim a SIEM is. Well, SIEMs were certainly something like that&#8230;about 15, even 20 years ago. A modern SIEM is cloud native, with advanced analytics capabilities and expanded to include features that came from the process of absorbing other product categories, such as UEBA and SOAR. When a cloud-based XDR provides claims its product is better because it is not an on-premises technology like SIEM, it's clearly misrepresenting SIEM in order to make the claim.&nbsp;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9g3y!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04e553ea-0f1f-48dc-bd1b-422e23536726_375x500.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9g3y!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04e553ea-0f1f-48dc-bd1b-422e23536726_375x500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!9g3y!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04e553ea-0f1f-48dc-bd1b-422e23536726_375x500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!9g3y!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04e553ea-0f1f-48dc-bd1b-422e23536726_375x500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!9g3y!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04e553ea-0f1f-48dc-bd1b-422e23536726_375x500.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9g3y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04e553ea-0f1f-48dc-bd1b-422e23536726_375x500.jpeg" width="375" height="500" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/04e553ea-0f1f-48dc-bd1b-422e23536726_375x500.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:500,&quot;width&quot;:375,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;The Straw Man Vector | Clip art of a straw man turned into a&#8230; | Stuart  Rankin | Flickr&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="The Straw Man Vector | Clip art of a straw man turned into a&#8230; | Stuart  Rankin | Flickr" title="The Straw Man Vector | Clip art of a straw man turned into a&#8230; | Stuart  Rankin | Flickr" srcset="https://substackcdn.com/image/fetch/$s_!9g3y!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04e553ea-0f1f-48dc-bd1b-422e23536726_375x500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!9g3y!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04e553ea-0f1f-48dc-bd1b-422e23536726_375x500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!9g3y!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04e553ea-0f1f-48dc-bd1b-422e23536726_375x500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!9g3y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04e553ea-0f1f-48dc-bd1b-422e23536726_375x500.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Entering the SIEM market is a considerable challenge to any technology company these days. SIEMs have evolved to encompass a large set of features and cover a broad range of use cases. For new entrants, the apples-to-apples comparison is very hard, as they usually have considerable gaps in capabilities, integrations and content to address as they evolve. In order to avoid the undesirable comparison against more mature products, avoiding the SIEM label altogether is a common strategy. The use of the strawman argument is a way to make an artificial differentiation, avoiding the direct comparison.&nbsp;</p><p>But how can prospective buyers make sure they won't fall for these fallacies? They need to examine the "not a SIEM" claim. Is this product really different from SIEMs, or is it just avoiding the label? Fortunately, identifying a SIEM is quite simple; we can just ask a few questions about the product's capabilities:</p><ul><li><p>Does it collect data, such as logs and events, from multiple sources?</p></li><li><p>Does it apply some type of logic, such as rules, search queries, statistics, ML-based magic, to that data to identify threats?</p></li><li><p>Does it provide alerts to analysts to investigate or take any other response action?</p></li><li><p>Does it store the collected data for long periods, making it available for searches and reports?</p></li></ul><p>If the answer to those questions is "yes"...it walks like a SIEM, it quacks like a SIEM, so it must be a SIEM!&nbsp;</p><p>Watch out for distractions; these providers will often claim their product is not a SIEM because it does something <em>more than those points</em>. But SIEMs continue to evolve to include many additional capabilities, such as response features often attributed to SOAR products. Including a feature <em>in addition to </em>those commonly present in a SIEM is not enough to make something <em>"not-a-SIEM".&nbsp;</em></p><p>Confused? Analogy time!</p><p>Tesla was the first car maker to include full self-driving in their cars; now, imagine if Tesla decided to market their vehicles as "car alternatives" because they included full self-driving! It doesn't make sense, right? That's similar to what we are seeing in the cybersecurity industry regarding SIEM.&nbsp;</p><p>But why are these vendors so afraid of being compared with other SIEMs? Because they lack very important SIEM capabilities. Some examples of those gaps are:</p><ul><li><p>Data sources: Some products are very limited in terms of the data sources they can use. Some of them can support mostly products from the same vendor, locking the customer in their "ecosystem". Some can ingest data from other sources, but are very limited in terms of what they can do with them.&nbsp;</p></li></ul><ul><li><p>Enrichment: They can enrich a very small subset of events from certain data sources with a limited number of enrichment data sources. External threat intel, for example: They may be able to integrate with something like Virustotal only, or just from their own proprietary threat intelligence service.</p></li></ul><ul><li><p>Analytics: They provide limited out of the box, non-transparent (you don't know what the system is doing to generate results) analytics, but you cannot write your own. You can write very simple rules (often with a proprietary language, or just simple SQML), and those rules can only look at a very small number of parameters. Check, for example, if their "behavior" analytics can be applied to not only users, but also other entities, such as endpoint or network hosts activity.</p></li></ul><ul><li><p>Smart lists and lookup tables: Basic items for any advanced analytics, but apart from a basic, single watchlist, they usually do not exist or are very simplistic and hard to manage.</p></li></ul><p>Many of these products try to be different by relying on automated actions and responses. What seems to be a good idea is, in fact, one of the main problems with these solutions. The SIEM is a solution to be used by humans, and some vendors claim their solution is built for a fully automated scenario. Well, I don't know a single SOC that is fully automated, and most organizations do not want to rely on full automation for response. So far, these fully autonomous solutions are built for a model that no one wants to use!&nbsp;</p><p>A SIEM provides automation where it makes sense, but its focus is to provide the necessary functionality to the analyst with the best, most streamlined experience. But a fully automated SOC is still beyond the capabilities of current AI systems. Properly identifying and responding to threats has nuances that many times will require human intervention, so it's better to rely on products that make that intervention simple and fast.</p><p>There are inefficient, expensive and slow SIEMs out there, but there are SIEMs that are efficient, cost-conscious and fast at scale. Do not let the strawman argument fool you and look carefully at these self-proclaimed SIEM alternatives. They are probably just an expensive subset of capabilities available on a modern SIEM disguised as the next big thing.</p>]]></content:encoded></item><item><title><![CDATA[What To Do When Threats Become Trivial?]]></title><description><![CDATA[A fascinating aspect of security operations teams is about how threats eventually become trivial, and what happens once they are seen that way.]]></description><link>https://blog.securitybalance.com/p/what-to-do-when-threats-become-trivial</link><guid isPermaLink="false">https://blog.securitybalance.com/p/what-to-do-when-threats-become-trivial</guid><dc:creator><![CDATA[Augusto Barros]]></dc:creator><pubDate>Wed, 20 Dec 2023 17:44:49 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4xWt!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc63fe9-63b9-474b-81d1-94e76f62f45e_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>A fascinating aspect of security operations teams is about how threats eventually become trivial, and what happens once they are seen that way. <br><br>Trivial threats are those that will rarely come up as something that humans have to deal with; they will be blocked by preventative technologies, fail because related vulnerabilities are present, or even handled via automated response. SOCs would die if they needed analysts to be involved in every attack the organization experiences, but fortunately, it doesn't happen. Trivial attacks happen, but they don't hit a point where they will trigger a full detection, investigation and response cycle with human involvement.<br><br>But what should be done to ensure that threats that are not trivial now will eventually be considered trivial in the future? <br><br>I noticed that many times this evolution happens without the SOC (as in TDIR functions) involvement. Vulnerabilities are patched by IT operations teams, preventative tools receive updates and start blocking those attacks. Eventually, the SOC stops seeing them.<br><br>But is this done in the most efficient manner? What happens when threat activity is between trivially blocked and "requires specific detection"? This seems to be a fertile ground for continuous improvement. Many teams will keep improving the TDIR process to make it more efficient, but if threats do not move to a point where they are automagically mitigated they will keep clogging the lines. Making improvements in TDIR ensure you have an efficient funnel, but moving threats to the category of trivially handled takes them out of the funnel, increasing the SOC bandwidth. <br><br>As said in a recent discussion about this, improving detection and response is like chewing a tums for your heartburn, while what you really should do is stop eating too much Taco Bell :-)<br><br>Does your SOC have a process to improve or accelerate that transition? How does it work?<br></p>]]></content:encoded></item><item><title><![CDATA[The Perils of Over-Consolidation in Cybersecurity: Lessons from Tolkien's Middle-Earth]]></title><description><![CDATA[In the realm of cybersecurity, the trend toward consolidation is becoming increasingly prominent.]]></description><link>https://blog.securitybalance.com/p/the-perils-of-over-consolidation</link><guid isPermaLink="false">https://blog.securitybalance.com/p/the-perils-of-over-consolidation</guid><dc:creator><![CDATA[Augusto Barros]]></dc:creator><pubDate>Wed, 20 Dec 2023 17:43:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!6PCG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2c567ea-337e-4587-95d5-137aed5c4641_800x750.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In the realm of cybersecurity, the trend toward consolidation is becoming increasingly prominent. Many vendors are striving to create comprehensive platforms, or more accurately, extensive product portfolios, aiming to fulfill the varied cybersecurity needs of organizations. This approach is reminiscent of a powerful narrative from J.R.R. Tolkien's "Lord of the Rings."</p><h2>The Allure of the One Ring: A Cybersecurity Parallel</h2><p>In Tolkien's epic, the One Ring, forged by the dark lord Sauron, was imbued with the power to control the other Rings of Power and dominate Middle-Earth. This concept parallels the current cybersecurity landscape:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6PCG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2c567ea-337e-4587-95d5-137aed5c4641_800x750.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6PCG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2c567ea-337e-4587-95d5-137aed5c4641_800x750.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6PCG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2c567ea-337e-4587-95d5-137aed5c4641_800x750.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6PCG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2c567ea-337e-4587-95d5-137aed5c4641_800x750.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6PCG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2c567ea-337e-4587-95d5-137aed5c4641_800x750.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6PCG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2c567ea-337e-4587-95d5-137aed5c4641_800x750.jpeg" width="338" height="316.875" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d2c567ea-337e-4587-95d5-137aed5c4641_800x750.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:750,&quot;width&quot;:800,&quot;resizeWidth&quot;:338,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Image preview&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Image preview" title="Image preview" srcset="https://substackcdn.com/image/fetch/$s_!6PCG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2c567ea-337e-4587-95d5-137aed5c4641_800x750.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6PCG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2c567ea-337e-4587-95d5-137aed5c4641_800x750.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6PCG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2c567ea-337e-4587-95d5-137aed5c4641_800x750.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6PCG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2c567ea-337e-4587-95d5-137aed5c4641_800x750.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em><strong>"One ring to rule them all,</strong></em></p><p><em><strong>&nbsp;&nbsp;&nbsp;one ring to find them,</strong></em></p><p><em><strong>One ring to bring them all</strong></em></p><p><em><strong>&nbsp;&nbsp;&nbsp;and in the darkness bind them."</strong></em></p><p>This verse aptly captures the essence of what many cybersecurity vendors are attempting: creating a singular, all-encompassing solution for organizational security needs.</p><h2>The Risk of Power Concentration</h2><p>In the world of Middle-Earth, the One Ring's existence was a central problem. It represented an overwhelming concentration of power, with the potential to corrupt even those with the noblest intentions. This narrative offers a cautionary tale for the cybersecurity industry.&nbsp;</p><p>When vendors offer broad platforms that promise to cover all aspects of an organization's cybersecurity, they are, in effect, creating their version of the "One Ring." Such consolidation, while seemingly convenient, carries inherent risks. It mirrors the centralization of power and the potential for corruption and failure.</p><h2>The Need for Diversification and Specialization</h2><p>Consolidation in cybersecurity, just like in Tolkien's universe, can be a double-edged sword. While integrating certain aspects, like combining Security Information and Event Management (SIEM) with User and Entity Behavior Analytics (UEBA), makes sense due to the overlapping nature of the data and technology, over-consolidation can be problematic.</p><p>For instance, bundling endpoint security tools with cloud security posture management may offer simplicity in supplier management but at the cost of flexibility and specialization. Such an approach can lead to a homogenized security posture, potentially leaving organizations vulnerable to more sophisticated threats.</p><h2>Avoiding Fragmentation Pitfalls: SIEM is your SOC&#8217;s Gandalf</h2><p>Just as the Fellowship of the Ring could have faltered without strong leadership, a fragmented cybersecurity approach can lead to gaps in defense, miscommunications, and inefficiencies. It's crucial for organizations to balance the approach of using specialized security solutions with strong foundational components, such as the SIEM.</p><p>Organizations should aim to emulate the Fellowship's model: diverse and specialized, yet harmoniously integrated under effective leadership. This approach ensures that while each security component operates with its expertise, they all contribute to a cohesive, robust defense mechanism.</p><h2>Embracing Elrond's Wisdom</h2><p>In "The Lord of the Rings," Elrond, the wise elf lord, advocates for the destruction of the One Ring to prevent its catastrophic potential. This perspective is valuable in the context of cybersecurity. Organizations should be wary of over-consolidation in their cybersecurity solutions. It's crucial to maintain a balance between the convenience of a unified platform and the need for specialized, adaptable security measures.&nbsp;</p><p>Next time Sauron comes to you with the amazing idea of this One Ring, listen to Elrond: &#8220;The Ring must be destroyed!"</p><h2>Striking the Right Balance</h2><p>In summary, while the pursuit of streamlined cybersecurity solutions is understandable, it's vital to recognize the dangers of over-consolidation. Like the One Ring in Tolkien's narrative, a singular, all-powerful cybersecurity solution could lead to unforeseen vulnerabilities and a lack of flexibility. Organizations should strive to strike a balance, ensuring that their cybersecurity posture is both comprehensive and adaptable, capable of responding to an ever-evolving threat landscape.</p><p>By heeding the lessons from Middle Earth, we can navigate the complex world of cybersecurity more wisely and effectively.</p>]]></content:encoded></item><item><title><![CDATA[Risk or Threat Oriented Security: Which Path Should We Choose?]]></title><description><![CDATA[Lately, I've been engaged in various discussions about what should drive our security efforts: risk or threats.]]></description><link>https://blog.securitybalance.com/p/risk-or-threat-oriented-security-which</link><guid isPermaLink="false">https://blog.securitybalance.com/p/risk-or-threat-oriented-security-which</guid><dc:creator><![CDATA[Augusto Barros]]></dc:creator><pubDate>Tue, 06 Jun 2023 19:29:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4xWt!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc63fe9-63b9-474b-81d1-94e76f62f45e_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Lately, I've been engaged in various discussions about what should drive our security efforts: risk or threats. It's an interesting debate, and today I want to explore it with you in a more engaging and enjoyable way.<br><br>Let's start with the risk-based approach. Ideally, this is the way to go. It involves identifying the key assets and evaluating the likelihood and potential impact of negative events to them. We often refer to these key assets as the "Crown Jewels." By understanding the likelihood and impact of those bad events, we can allocate appropriate resources to protect them effectively.<br><br>On the other hand, there's the threat-oriented perspective. Here, the focus is less on identifying the potential impact and likelihood of events and more on pinpointing threat activity that is likely to target our organization. For instance, organizations adopting a threat-oriented view would identify the most common malware families affecting similar organizations and implement controls to prevent, detect, and respond to them.<br><br>Big parenthesis here; talking about threat vs risk doesn&#8217;t make much sense from a purist point of view, as threat is part of risk. But for simplification purposes, I&#8217;d say that the &#8220;risk oriented&#8221; view is focused on key assets, while &#8220;threat oriented&#8221; is focused on threats.<br><br>So, while risk-based efforts revolve around safeguarding high-impact assets, threat-based efforts emphasize countering prevalent threats. The typical security operations professionals tend to prefer the threat-based approach. They observe a direct correlation between the perceived threats and incidents, leading them to concentrate on malware prevention, threat intelligence acquisition, and detection techniques.<br><br>Conversely, data security professionals, security architects, and risk managers are usually more inclined toward the risk-based approach. They want to first identify what truly matters and needs protection and then design controls around those assets. This approach helps optimize efforts by focusing resources on mitigating risks instead of wasting them on prevalent but relatively harmless threats.<br><br>The "threat team" argues that it makes sense to protect against the activity they observe, regardless of the nature and location of the key assets. For them, the effort of identifying key assets takes too long and is never accurate enough to be useful.<br><br>Both teams aim to optimize efforts, but they take different approaches. So, why the disparity?<br><br>The choice between risk and threat orientation depends on several variables, such as the type and size of the business, the potential classes of impact, and even the profile of the security team. Asking a team with a background in security operations to work in a risk-based manner might not yield the best results, just as asking data security or risk managers to operate in a threat-oriented fashion might not be as effective.<br><br>Adopting a risk-based mindset helps us avoid the trap of pursuing absolute security or overspending on protection. On the other hand, threat orientation ensures that our security measures align with real-world threat activity observed in other organizations.<br><br>Striking a balance is crucial. This debate can only yield a wrong answer when it tries to find a definitive, one-sided solution.<br><br>From my personal perspective, the threat-based approach has always appeared more pragmatic. However, there are many edge cases where it may result in unnecessary efforts or misguided focus. If I had to provide a single answer, I would suggest: <br><br><em><strong>"Do it in a threat-based manner, but always conduct a sanity check considering your key processes and assets."<br></strong></em><br>Now, I'd love to hear your thoughts. How would you approach this challenge?<br></p>]]></content:encoded></item><item><title><![CDATA[Cybersecurity Is Not A Pair Of Sneakers]]></title><description><![CDATA["Just do it" does not work for cybersecurity.]]></description><link>https://blog.securitybalance.com/p/cybersecurity-is-not-pair-of-sneakers</link><guid isPermaLink="false">https://blog.securitybalance.com/p/cybersecurity-is-not-pair-of-sneakers</guid><dc:creator><![CDATA[Augusto Barros]]></dc:creator><pubDate>Thu, 14 Oct 2021 21:34:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4xWt!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc63fe9-63b9-474b-81d1-94e76f62f45e_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>"Just do it" does not work for cybersecurity.</p><p>I've seen many comparisons with very complex things we've managed to accomplish. Man on the Moon, robots on Mars, etc. "We've manged to do all those things, how come there are still breaches happening?". Why can't we take a "just do it" approach for cybersecurity?</p><p>Well, for many reasons.&nbsp;</p><p>First, resources available. The cost of the Apollo program was around $257 BILLION (inflation adjusted). That was all spent on a very specific, point in time objective, to put a man on the Moon. Some might say we've been spending close to that every year on security, but that's for the entire global cybersecurity market. Project Apollo built only 15 flight-capable Saturn V rockers.&nbsp;&nbsp;</p><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0qcD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabbe8c95-0230-45cb-822c-aefb080ddc04_410x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0qcD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabbe8c95-0230-45cb-822c-aefb080ddc04_410x512.png 424w, https://substackcdn.com/image/fetch/$s_!0qcD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabbe8c95-0230-45cb-822c-aefb080ddc04_410x512.png 848w, https://substackcdn.com/image/fetch/$s_!0qcD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabbe8c95-0230-45cb-822c-aefb080ddc04_410x512.png 1272w, https://substackcdn.com/image/fetch/$s_!0qcD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabbe8c95-0230-45cb-822c-aefb080ddc04_410x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0qcD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabbe8c95-0230-45cb-822c-aefb080ddc04_410x512.png" width="192" height="240" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/abbe8c95-0230-45cb-822c-aefb080ddc04_410x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:240,&quot;width&quot;:192,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!0qcD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabbe8c95-0230-45cb-822c-aefb080ddc04_410x512.png 424w, https://substackcdn.com/image/fetch/$s_!0qcD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabbe8c95-0230-45cb-822c-aefb080ddc04_410x512.png 848w, https://substackcdn.com/image/fetch/$s_!0qcD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabbe8c95-0230-45cb-822c-aefb080ddc04_410x512.png 1272w, https://substackcdn.com/image/fetch/$s_!0qcD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabbe8c95-0230-45cb-822c-aefb080ddc04_410x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><p>The Saturn V Rocket</p><p>The world spends hundreds of billions in cybersecurity every year, but that money is to cover all organizations out there. There's an estimate of 300 million business worldwide. Of course, the majority are SMB, but that means the annual average expense in cybersecurity is less than a thousand dollars. There is a lot of money on this business, but it is spread thin and unevenly.</p><p>Second, it is a moving target. All the technology and ingenuity embarked on the Curiosity rover is impressive, a feat of engineering. It came with a $2.5B price tag, and it has been performing remarkably well. But how successful would Curiosity be if we just decided to drop it in Venus? Or Jupiter?</p><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Qbvf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82a5aae0-a77a-45bc-8e4e-6f163c17afb9_371x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Qbvf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82a5aae0-a77a-45bc-8e4e-6f163c17afb9_371x512.png 424w, https://substackcdn.com/image/fetch/$s_!Qbvf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82a5aae0-a77a-45bc-8e4e-6f163c17afb9_371x512.png 848w, https://substackcdn.com/image/fetch/$s_!Qbvf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82a5aae0-a77a-45bc-8e4e-6f163c17afb9_371x512.png 1272w, https://substackcdn.com/image/fetch/$s_!Qbvf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82a5aae0-a77a-45bc-8e4e-6f163c17afb9_371x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Qbvf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82a5aae0-a77a-45bc-8e4e-6f163c17afb9_371x512.png" width="174" height="240" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/82a5aae0-a77a-45bc-8e4e-6f163c17afb9_371x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:240,&quot;width&quot;:174,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Qbvf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82a5aae0-a77a-45bc-8e4e-6f163c17afb9_371x512.png 424w, https://substackcdn.com/image/fetch/$s_!Qbvf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82a5aae0-a77a-45bc-8e4e-6f163c17afb9_371x512.png 848w, https://substackcdn.com/image/fetch/$s_!Qbvf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82a5aae0-a77a-45bc-8e4e-6f163c17afb9_371x512.png 1272w, https://substackcdn.com/image/fetch/$s_!Qbvf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82a5aae0-a77a-45bc-8e4e-6f163c17afb9_371x512.png 1456w" sizes="100vw"></picture><div></div></div></a><p>The Curiosity Mars Rover</p><p>Venus atmosphere is extremely hot and dense. The surface level pressure is almost a hundred times Earth's atmosphere or almost 20.000 times Mars atmosphere. To make things worse, there are cloud of highly corrosive sulfuric acid. As advanced as the Mars rover is, it wouldn't survive in Venus.</p><p>In cybersecurity we are often judged by how well our Mars rovers perform in Venus like environments. The conditions where the technology operates change dramatically. Look at all the technology changes we've been experiencing in the last 20 years. We are talking about a period when Amazon, Google and Facebook surged from startups to corporate behemoths, smartphones and tablets became ubiquitous and the web moved from 1 to 2.0 and then to the cloud. The field where cybersecurity plays now is different than what it was in 2015, 2010 or 2001. Have we managed to "solve the security problem"? We would do extremely well playing in that 2001, maybe even the 2010 scenario but the goalposts have moved from there and are still moving ahead.</p><p>And last, the major issue we face, the "sentient adversary". What does that mean? It means we are not solving a fixed problem. From a problem domain perspective, we are not dealing with engineering, it is game theory. We have a non-zero-sum game to deal with. Our "problem" has smart people on the other side, with motivations and constantly developing new strategies to win. Together with the changing playing field from point #2, it makes a considerable challenge. The problem today is not the same as yesterday, and it will be different tomorrow as well. The adversaries think "outside the box", putting cybersecurity in a domain where it can't be solved even by existing AI bleeding-edge technology. The adversary puts cybersecurity in the same realm as crime and terrorism. We can't just "solve it".</p><p>"Just Do It" may work as a sneakers slogan, but for cybersecurity, the approach must be different.&nbsp; In this space what we need is the OODA loop: Observe, Orient, Decide, Act*. Not as catchy, but it gives a chance to survive to fight another day.</p><p>* <em>For cybersecurity I like to use "Adapt" instead of "Act", but the spirit is the same.</em></p>]]></content:encoded></item><item><title><![CDATA[Do Not Look For A Root Cause]]></title><description><![CDATA[Reading about root cause analysis (RCA) for security breaches really freaks me out.]]></description><link>https://blog.securitybalance.com/p/do-not-look-for-root-cause</link><guid isPermaLink="false">https://blog.securitybalance.com/p/do-not-look-for-root-cause</guid><dc:creator><![CDATA[Augusto Barros]]></dc:creator><pubDate>Fri, 08 Oct 2021 14:25:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4xWt!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc63fe9-63b9-474b-81d1-94e76f62f45e_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Reading about root cause analysis (RCA) for security breaches really freaks me out.</p><p>Root causes are behind accidents and other unintentional events. Not breaches.</p><p>Do you want to know the root cause of a breach? No, it is not a vulnerability that was left unpatched. If you follow the chain of events, someone decided to look for it, assembled a plan of attack, was driven by a motivation...all that at the attacker side.</p><p>Defence should look at breaches from a multi-factor point of view. Many things have to go wrong for an attack to be successful and cause harm. You may have a vulnerability providing initial access, but what about allowing privileged access? Lateral movement? Exfiltration, or mass encryption for impact? And why weren't you able to detect and respond to each one of those steps?</p><p>Post-mortem analysis usually take the approach of looking at multiple points and is better suited for security incidents. I usually do not like to use project management techniques for security needs, but on this case, I believe it makes sense.</p><p>In short, no RCA for your breaches. Take a broader approach and perform a post-mortem analysis.</p>]]></content:encoded></item><item><title><![CDATA[Professional Certifications, Reboot!]]></title><description><![CDATA[After two months and a few hundred dollars later, my most recent personal project is completed.]]></description><link>https://blog.securitybalance.com/p/professional-certifications-reboot</link><guid isPermaLink="false">https://blog.securitybalance.com/p/professional-certifications-reboot</guid><dc:creator><![CDATA[Augusto Barros]]></dc:creator><pubDate>Fri, 07 May 2021 16:39:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4xWt!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc63fe9-63b9-474b-81d1-94e76f62f45e_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>After two months and a few hundred dollars later, my most recent personal project is completed. 10 years after my TOGAF9 certification, I decided to play the test taker again and obtain a new batch of professional certifications: AWS Certified Cloud Practitioner, AWS Certified Security Specialty and Microsoft Certified: Azure Fundamentals.</p><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_nQ1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2f93d02-6e10-43bf-b366-ed3bdfb9a4aa_603x98.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_nQ1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2f93d02-6e10-43bf-b366-ed3bdfb9a4aa_603x98.png 424w, https://substackcdn.com/image/fetch/$s_!_nQ1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2f93d02-6e10-43bf-b366-ed3bdfb9a4aa_603x98.png 848w, https://substackcdn.com/image/fetch/$s_!_nQ1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2f93d02-6e10-43bf-b366-ed3bdfb9a4aa_603x98.png 1272w, https://substackcdn.com/image/fetch/$s_!_nQ1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2f93d02-6e10-43bf-b366-ed3bdfb9a4aa_603x98.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_nQ1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2f93d02-6e10-43bf-b366-ed3bdfb9a4aa_603x98.png" width="603" height="98" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a2f93d02-6e10-43bf-b366-ed3bdfb9a4aa_603x98.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:98,&quot;width&quot;:603,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_nQ1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2f93d02-6e10-43bf-b366-ed3bdfb9a4aa_603x98.png 424w, https://substackcdn.com/image/fetch/$s_!_nQ1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2f93d02-6e10-43bf-b366-ed3bdfb9a4aa_603x98.png 848w, https://substackcdn.com/image/fetch/$s_!_nQ1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2f93d02-6e10-43bf-b366-ed3bdfb9a4aa_603x98.png 1272w, https://substackcdn.com/image/fetch/$s_!_nQ1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2f93d02-6e10-43bf-b366-ed3bdfb9a4aa_603x98.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><p>I didn't need these certifications for my current job, and I'm not looking for a new one either, so this is not about job requirements or job hunting. So why did I do it?</p><p>I did it because I could do it :-) Well, ok, let me elaborate a bit. My career has been slowly moving away from more technical roles, and that's reducing my direct, hands on contact with technology. I don't think this is a bad thing, but as someone with the technical background, I miss that deeper understanding of the things I need to talk and write about.</p><p>At the same time, I do not have the same drive to learn things that I do not have an immediate need for, learning just for the sake of learning. I still love learning new things, but that youth drive of building labs and labs for learning things we may never touch as part of our job is just not there anymore. Putting a target like a certification in front of me (and paying for it) seems to be an effective way to trigger my brain into "I need to learn this" mode. I learned many things in the past while preparing for getting certs, so I thought I could use the same method again. It was nice, it worked well for this intent.</p><p>Cloud adoption keeps growing and cloud is directly affecting the work of anyone in security these days. It's not different for me: I work for a <a href="https://www.securonix.com/">Cloud SIEM vendor</a>, and we are bringing many innovations to the SIEM space that are directly related to cloud. Securonix recently announced <a href="https://www.securonix.com/resources/bring-your-own-aws/">"Bring Your Own Cloud"</a>, for example, and it is deeply rooted in AWS offerings, so it seemed natural to me that I should put a couple of AWS certs in my project. AWS Cloud Practitioner helped me learn more about the very broad range of offerings from AWS, and the security specialty was useful to provide more depth to my understanding of cloud threats and cloud security controls.</p><p>In addition to the AWS certs, I wanted to add the (ISC)2 CCSP to the mix as well. I checked the domain of knowledge of the cert, ran through a few practice exams and noticed I already had most of the skills and knowledge required to pass it. So why didn't I do it? Because it's freaking expensive! USD600 is beyond any reasonable justification for a simple multiple-choice exam. Maybe I would take it if I was looking for a job like cloud security architect, or even as a CISO for a company with a strong cloud presence, but just for the fun of doing it? No, I'm sorry, it doesn't make any sense.&nbsp;</p><p>An Azure cert was a natural choice to complete my project. AWS and Azure are by far the most visible cloud providers (sorry Google!), so going through the process for both looked like the best choice.</p><p>There are a few things I noticed during this exercise that I think it's worth sharing. First, it confirmed to me that test taking talent is really a thing. I'm a helluva test taker. I'm not bragging; apart from helping me pass tests and exams easily, it doesn't provide me with any real competitive advantage "on the job". I've always been like that and was happy to see I haven't lost it after so many years without sitting for a test. I didn&#8217;t spend more than a handful of hours reading for the full project. I don&#8217;t feel nervous and even have fun while taking the tests, so everything was a fun experience.</p><p>But when you are a hiring manager and you see those certs in a resume, it's always important to find out if those certs came from real experience or just from good test taking skills (or worse, memorizing those awful brain dumps).</p><p>Don't get me wrong, it doesn't mean that certs on a resume means nothing. Remember, the main reason for me to do it was to force me into learning something about those technologies. Even if I don't have the hands-on experience the test developers were trying to verify with these exams, I still had to at least read a bit and get solid understanding of the basic concepts.&nbsp;</p><p>Talking about basic concepts...if you want to get certs, LEARN THE F* BASICS! You can't believe the number of questions I was able to answer because of basic stuff, not necessarily tied to those specific cloud providers. If you know how crypto works, for example, a lot of the AWS security specialty questions will be very easy to answer. Same thing for networking and network security. AWS security groups, network ACLs, Azure network security groups...those are straightforward to learn when you know those things well. I didn't take the real CCSP, but the practice questions I've done indicate that CISSP level concepts would put more than half of way behind you on that one.</p><p>Finally, some interesting bits about AWS and Azure I was able to notice:</p><blockquote><p>&#183;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Knowing the basics of one of those means you have almost all the basics of the other. Key concepts are virtually identical.&nbsp;</p></blockquote><blockquote><p>&#183;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;The naming convention of Azure is AWESOME. It's very easy to know what products and services do just from their names. They may not sound as sexy as "Athena", "Glacier", or high tech as &#8220;S3&#8221;, &#8220;EC2&#8221;, but they tell you in a very simple manner what they are about.</p></blockquote><blockquote><p>&#183;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Both services are evolving so fast it's hard to keep study material, documentation and questions aligned and up to date on the latest offerings. Don't be surprised to see questions about things you didn't see in your study material. Check some of the announcements and blog posts from the past year as part of your study work.</p></blockquote><blockquote><p>&#183;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;AWS Security Specialty is the one I see closest to being "hard". There's really a lot of stuff to cover, in a relatively deep level of detail: Networking, Crypto, IAM, logging, policies syntax and small idiosyncrasies. I can see how it really tries to assess real experience on AWS security.</p></blockquote><p>Am I done with the certs now? Maybe, not sure. It may become an expensive hobby :-). Well...those Azure security certs do not look that hard, I still have that 50% off voucher for AWS exams and I really need to spend some time learning about Google cloud ;-)</p><p>P.S. As I&#8217;m doing this during the COVID-19 pandemic, I took these tests in the &#8220;online proctored&#8221; mode. THEY SUCK! I was expecting those VUE, PSI guys would have learned by now how to do it right. No, they tech and processes are horrible. I had problems during the 3 exams, one with PSI (AWS Practitioner), the worst one, and two with VUE. If you are a person that gets anxious or nervous during the exam, this is definitely not for you. Some of the issues I had to go through would take many candidates out of their minds and strongly impair their ability to answer the questions.</p>]]></content:encoded></item><item><title><![CDATA[The Bright Future of Cloud SIEM]]></title><description><![CDATA[TL;DR: People keep questioning SIEM value, but cloud SIEM makes SIEM so much better.]]></description><link>https://blog.securitybalance.com/p/the-bright-value-of-cloud-siem</link><guid isPermaLink="false">https://blog.securitybalance.com/p/the-bright-value-of-cloud-siem</guid><dc:creator><![CDATA[Augusto Barros]]></dc:creator><pubDate>Fri, 16 Apr 2021 20:49:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4xWt!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc63fe9-63b9-474b-81d1-94e76f62f45e_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>TL;DR: People keep questioning SIEM value, but cloud SIEM makes SIEM so much better. SIEM is now capable of delivering a lot of security value with far less effort from security teams.<br><br><br>The SIEM market is a US$5B market with a two-digit annual growth rate. Still, we keep seeing multiple questions and discussions around SIEM&#8217;s role, future and value. Why?</p><p>There are many reasons, including:<br><br></p><ul><li><p><strong>The high importance of SIEM&#8217;s role for security operations:</strong> The SIEM is often the foundation of Security Operation Centers and has a critical role in their work. It is natural to see it being constantly evaluated and discussed as it has a role in almost all SOC processes.</p></li><li><p><strong>Cost and budget share:</strong> SIEM is not cheap. It usually takes a big chunk of the security budget. Organizations will keep trying to reduce it as part of their cost optimization efforts, while vendors of other technologies will keep trying to sell their products as alternatives to tap into existing SIEM budgets.</p></li><li><p><strong>Operational effort required:</strong> SIEM is definitely not a &#8220;set and forget&#8221; tool. This is not a deficiency per se, as other technologies, such as EDR, also require people to deliver value. But the concerns about how much effort must be put into SIEM operations is a constant driver of discussions about improvements or even replacements of this technology.</p></li><li><p><strong>Multitude of experiences</strong>: SIEM has been around for more than 20 years. Many professionals have gone through multiple implementations, sometimes with good experiences, sometimes not so much. I&#8217;ve seen many people with very strong opinions on SIEM based on their personal experiences with this type of tool, experiences that many times are not representative of how SIEMs can support security initiatives.</p></li><li><p><strong>Evolution of other technologies and of the entire technology landscape:</strong> As other technologies evolve, it is inevitable to look at how they impact the role of SIEM. It happened with UEBA, it happened with SOAR, it is happening with XDR. The technology environments where these tools operate are also constantly evolving. Big SAN storage systems came up, virtualization became ubiquitous, big data spread out like wildfire. These changes affect the security tools we use to protect IT environments in multiple ways. Some increased the amount of data to be collected and processed, while others were used to evolve SIEM and make it more scalable and capable.</p></li></ul><p>Nothing is more important to those discussions as Cloud SIEM. Not just &#8220;hosted&#8221; in the cloud, but as a native cloud offering. Why? Because now SIEM vendors can have some control over deployment success. What are you saying, Augusto? Didn&#8217;t they have control over the success of their own product before? Yes, that&#8217;s true!<br><br>As a traditional SIEM vendor, it is very hard for you to ensure the customer will be able to get all the benefits your product can provide. First, they may underestimate the required capacity for their environment. They will end with a sluggish product, overflowing with data, having to deal with adding servers, memory, storage, or even stopping the deployment to rearchitect the whole solution before getting any value from it. I&#8217;ve seen countless SIEM deployments dying this way before generating any return of investment.</p><p>But it doesn&#8217;t stop there. They may get the sizing right but underestimate the effort to keep it running. They estimate the number of people to use the SIEM, but they forget that a traditional SIEM requires people to <em><strong>use it</strong></em> but also to <em><strong>keep it running</strong></em>. That means people will spend their time keeping servers running, applying patches (to operating systems, middleware and to the SIEM software too), troubleshooting log collection, ensuring storage doesn&#8217;t blow up, and not paying attention to what the SIEM should actually be doing for them. The tool is up and running, but again, not providing any value.<br></p><p>We can see how much the vendor depends on the customer to provide value. And even if the customers do things properly, there are other challenges too. Traditional software allows for high variation of deployments: Customers running on different versions, with different hardware and architecture. How can a vendor distribute SIEM content (parsers, rules, machine learning models, etc) that works in a consistent manner to its customers in this scenario? It just can&#8217;t. <br><br>Considering these factors, I risk saying that offering a traditional SIEM solution is like the Sisyphus Myth. As much as the vendor tries to deliver value, the solution will eventually fail to achieve the customer objectives. As traditional software, SIEM was really destined to die.</p><h3>How does the cloud SIEM change this?</h3><p>First, many challenges on SIEM deployments are related to problems that are completely solved or minimized by the SaaS model. Cloud services are highly scalable and elastic, and SaaS practically eliminates the need to maintain the application and underlying components. Now you have a SIEM that finally scales and does not require an army to keep it running. You can focus on using it appropriately. <br><br>Second, a SaaS SIEM puts customers on highly standardized deployments. With most customers running on the same version, without capacity challenges, it&#8217;s far easier to deliver content that works for all of them. That makes a huge difference in perceived value. And it doesn&#8217;t stop there. With this scenario it becomes easier to the vendor to finally realize the benefits of the &#8220;wisdom of the crowds&#8221;. Developing more complex ML models for threat detection, for example, becomes easier and more effective. The vendor now has access to more data to train and tune the models. Even simple IOC match detection content can be quickly developed and delivered to all customers, allowing the SIEM vendor to provide detection of new, in the wild threats. <br><br>Finally, delivering any software solution via SaaS gives the developer the opportunity to embrace more agile development practices. Upgrading a traditional SIEM deployment is so complex that vendors would naturally rely on traditional waterfall development practices, generating big releases with long times between them. SaaS SIEM can leverage agile development and CI/CD practices, so new features can be quickly added, and defects quickly fixed. <br><br>Cloud SIEM is on its infancy when you consider SIEM is just past its teenage years. But there are so many opportunities to explore with this model that I believe now we can say &#8220;Next-Gen SIEM&#8221; without feeling silly about it. Be careful with &#8220;SIEM is dead&#8221; claims. That sounds to me much like "I think there is a world market for maybe five computers", by Thomas Watson in 1943.</p>]]></content:encoded></item><item><title><![CDATA[Some additional words on those SOC robots]]></title><description><![CDATA[The topic on SOC automation is really a fun one to think about, and even after putting my thoughts into words with my last post, I've still kept thinking about it.]]></description><link>https://blog.securitybalance.com/p/some-additional-words-on-those-soc</link><guid isPermaLink="false">https://blog.securitybalance.com/p/some-additional-words-on-those-soc</guid><dc:creator><![CDATA[Augusto Barros]]></dc:creator><pubDate>Fri, 19 Mar 2021 21:07:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4xWt!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc63fe9-63b9-474b-81d1-94e76f62f45e_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>&nbsp;The topic on SOC automation is really a fun one to think about, and even <a href="http://blog.securitybalance.com/2021/03/the-robots-are-coming.html">after putting my thoughts into words with my last post</a>, I've still kept thinking about it. Some additional considerations came to my mind.</p><p>The simplistic question of "Will machines replace humans in a SOC" can be clearly answered with a NO, as I explained in my previous post. As the human attackers are required to evolve the attacking robots, blue team people are required to update the automated defenses.</p><p>But things change if the question is asked with some additional nuance. If you ask "will defense actions be automated end to end, from detection to response actions?", it becomes a more interesting question to answer.</p><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BTmm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F056c7151-cdc3-45c2-a95b-eddc17434e2f_512x267.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BTmm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F056c7151-cdc3-45c2-a95b-eddc17434e2f_512x267.png 424w, https://substackcdn.com/image/fetch/$s_!BTmm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F056c7151-cdc3-45c2-a95b-eddc17434e2f_512x267.png 848w, https://substackcdn.com/image/fetch/$s_!BTmm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F056c7151-cdc3-45c2-a95b-eddc17434e2f_512x267.png 1272w, https://substackcdn.com/image/fetch/$s_!BTmm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F056c7151-cdc3-45c2-a95b-eddc17434e2f_512x267.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BTmm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F056c7151-cdc3-45c2-a95b-eddc17434e2f_512x267.png" width="320" height="167" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/056c7151-cdc3-45c2-a95b-eddc17434e2f_512x267.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:167,&quot;width&quot;:320,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!BTmm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F056c7151-cdc3-45c2-a95b-eddc17434e2f_512x267.png 424w, https://substackcdn.com/image/fetch/$s_!BTmm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F056c7151-cdc3-45c2-a95b-eddc17434e2f_512x267.png 848w, https://substackcdn.com/image/fetch/$s_!BTmm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F056c7151-cdc3-45c2-a95b-eddc17434e2f_512x267.png 1272w, https://substackcdn.com/image/fetch/$s_!BTmm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F056c7151-cdc3-45c2-a95b-eddc17434e2f_512x267.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><p>The scenario of automated threats that <a href="https://medium.com/anton-on-security/stop-trying-to-take-humans-out-of-soc-except-wait-wait-wait-e19c5887ef2f">Anton described in his post </a>will, IMO, require SOCs to put together some end to end automation. Having a human involved for every response will not scale to face those attacks. Humans will be responsible for creating those playbooks and monitor their performance, but they cannot be involved in their execution. We need SOC automation that allows us to detect, investigate and initiate response without human intervention. This is challenging, but we must get there at some point.</p><p><a href="https://www.linkedin.com/feed/update/urn:li:activity:6777725710153977856?commentUrn=urn%3Ali%3Acomment%3A%28activity%3A6777725710153977856%2C6777748245503451136%29">Andre Gironda commented on the LinkedIn post</a> pointing to my blog post that even with the appropriate tools he still can't fully automate simple phishing response. I could say he's probably being too perfectionist or doing something wrong, but I actually believe him. I believe automation can provide value by reducing human effort in the SOC right now, but full automation, even for some specific threats, is still challenging. But we'll have to get there if we want to stand a chance.</p>]]></content:encoded></item><item><title><![CDATA[The Robots Are Coming!]]></title><description><![CDATA[The debate around SOC automation has been a fun one to follow. Allie Mellen wrote a short but on the spot piece about it, reaffirming what seems to be the commonsense opinion on this topic today: Automation is good, but to augment human capacity, not replace it.]]></description><link>https://blog.securitybalance.com/p/the-robots-are-coming</link><guid isPermaLink="false">https://blog.securitybalance.com/p/the-robots-are-coming</guid><dc:creator><![CDATA[Augusto Barros]]></dc:creator><pubDate>Tue, 16 Mar 2021 21:42:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4xWt!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bc63fe9-63b9-474b-81d1-94e76f62f45e_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>&nbsp;The debate around SOC automation has been a fun one to follow.&nbsp;<a href="https://go.forrester.com/blogs/stop-trying-to-take-humans-out-of-security-operations/">Allie&nbsp;Mellen&nbsp;wrote a short but on the&nbsp;spot&nbsp;piece about it</a>, reaffirming what&nbsp;seems to be the&nbsp;commonsense&nbsp;opinion on this topic today: Automation is good, but to augment human capacity, not replace it.</p><p>After that&nbsp;<a href="https://medium.com/anton-on-security/stop-trying-to-take-humans-out-of-soc-except-wait-wait-wait-e19c5887ef2f">Anton brought up a very interesting follow up</a>, confirming that view but also pointing to a scary future scenario, where automation would be adopted so extensively by the attackers that it would force&nbsp;defense&nbsp;to do the same. Does this scenario make sense?&nbsp;</p><p>I believe it does, and indeed it forces defense to adopt more automation.&nbsp;But even if Anton says the middle&nbsp;ground&nbsp;position is "cheating", I still think it is the most reasonable one. There will never be (until we reach the Singularity) a fully automated SOC, just as there will never be a fully automated attacker (until...you know). Why? Let's look at the scenario Anton painted for this evolved attacker:</p><p>&#8226;&nbsp;<em>You face the attacker in possession of a machine that can auto-generate reliable&nbsp;zero day&nbsp;exploits and then use them (an upgraded version of what was the subject of&nbsp;<a href="https://en.wikipedia.org/wiki/2016_Cyber_Grand_Challenge">2016 DARPA Grand Challenge</a>)</em></p><p>&#8226;&nbsp;<em>You face the attackers who use&nbsp;<a href="https://seclists.org/dailydave/2021/q1/6">worms for everything</a>, and these are not the dumb 2003 worms, but these are coded by the best of the best of the offensive &#8220;community&#8221;</em></p><p>&#8226;&nbsp;<em>Your threat assessment indicates that &#8220;your&#8221; attackers are&nbsp;<a href="http://lists.immunityinc.com/pipermail/dailydave/2020-March/001593.html">adopting automation faster than you are</a>&nbsp;and the delta is increasing (and the speed of increase is growing).</em></p><p>Even if it looks scary, this scenario is still limited in certain points. You may have malware capable of creating exploits by itself, but what will they exploit? What is this&nbsp;exploitation trying to accomplish?&nbsp;There is&nbsp;an&nbsp;abstract&nbsp;level of&nbsp;actions&nbsp;that is defined by the creator of the malware.&nbsp;Using&nbsp;MITRE ATT&amp;CK language, the malware is capable of generating multiple&nbsp;<em><strong>instances</strong></em>&nbsp;of a selection of techniques, but&nbsp;<em><strong>a human must define the tactics and select the techniques</strong></em>&nbsp;to be used. Quoting Rumsfeld, there will be more known unknowns, but&nbsp;<em><strong>the unknown unknown is still the realm of humans</strong></em>.</p><p>A few years&nbsp;ago,&nbsp;I had a similar discussion with a vendor claiming that their deep learning-based technology would be able to&nbsp;detect"any malware". This is nonsense. Even the most advanced ML&nbsp;still needs to be&nbsp;pointed to some data to look at. If the signal required to detect something is not in that data, there's no miracle. Let's look at a simple example:</p><p>&#8226;&nbsp;A super&nbsp;network-based&nbsp;detection technology inspects ALL network traffic and can miraculously identify any attack.</p><p>&#8226;&nbsp;The attacker is on host A in this network, planning to attack host B, connected to the same network</p><p>&#8226;&nbsp;The attacker scans for&nbsp;Bluetooth&nbsp;devices from host A, finds host B, exploits host B via a&nbsp;Bluetooth&nbsp;exploit</p><p>&#8226;&nbsp;The super NDR/NIDS tool sits there patiently waiting to see&nbsp;<em><strong>an&nbsp;attack that never traverses the monitored network</strong></em>!</p><p>You may claim this is&nbsp;an&nbsp;edge scenario, but I'm using&nbsp;anexaggerated situation on purpose.&nbsp;There&#8217;s still many cases that we can relate to, such as&nbsp;breaches due to the use of shadow IT, cloud resources, etc. What I want to&nbsp;highlight&nbsp;is&nbsp;the&nbsp;type of&nbsp;lateral thinking very often employed by attackers in cybersecurity. And&nbsp;<em><strong>the lateral thinking is still exclusive of humans</strong></em>.</p><p>What I'm trying to say is that fully automated threats are scary, buy they&nbsp;lack the main force that makes detecting threats challenging. Defense automation can evolve to match the same level, but both sides will still rely on humans to&nbsp;tip the scale&nbsp;when those machines reach a balance point in capabilities.</p><p>What we have today is similar to those battling&nbsp;robots&nbsp;TV shows. Machines operated by humans. If things evolve as Anton suggests we will move to what happens in "robot soccer": human created machines operating autonomously, but within a finite framework of capabilities.</p><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!u1cb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c521052-a1e0-4b7b-a2d9-c714986cedf0_512x288.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!u1cb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c521052-a1e0-4b7b-a2d9-c714986cedf0_512x288.jpeg 424w, https://substackcdn.com/image/fetch/$s_!u1cb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c521052-a1e0-4b7b-a2d9-c714986cedf0_512x288.jpeg 848w, https://substackcdn.com/image/fetch/$s_!u1cb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c521052-a1e0-4b7b-a2d9-c714986cedf0_512x288.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!u1cb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c521052-a1e0-4b7b-a2d9-c714986cedf0_512x288.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!u1cb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c521052-a1e0-4b7b-a2d9-c714986cedf0_512x288.jpeg" width="320" height="180" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2c521052-a1e0-4b7b-a2d9-c714986cedf0_512x288.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:180,&quot;width&quot;:320,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!u1cb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c521052-a1e0-4b7b-a2d9-c714986cedf0_512x288.jpeg 424w, https://substackcdn.com/image/fetch/$s_!u1cb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c521052-a1e0-4b7b-a2d9-c714986cedf0_512x288.jpeg 848w, https://substackcdn.com/image/fetch/$s_!u1cb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c521052-a1e0-4b7b-a2d9-c714986cedf0_512x288.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!u1cb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c521052-a1e0-4b7b-a2d9-c714986cedf0_512x288.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Yfd9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feca2e5b4-10a0-45eb-b133-36f02bfb3eb2_512x288.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Yfd9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feca2e5b4-10a0-45eb-b133-36f02bfb3eb2_512x288.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Yfd9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feca2e5b4-10a0-45eb-b133-36f02bfb3eb2_512x288.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Yfd9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feca2e5b4-10a0-45eb-b133-36f02bfb3eb2_512x288.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Yfd9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feca2e5b4-10a0-45eb-b133-36f02bfb3eb2_512x288.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Yfd9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feca2e5b4-10a0-45eb-b133-36f02bfb3eb2_512x288.jpeg" width="320" height="180" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/eca2e5b4-10a0-45eb-b133-36f02bfb3eb2_512x288.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:180,&quot;width&quot;:320,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Yfd9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feca2e5b4-10a0-45eb-b133-36f02bfb3eb2_512x288.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Yfd9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feca2e5b4-10a0-45eb-b133-36f02bfb3eb2_512x288.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Yfd9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feca2e5b4-10a0-45eb-b133-36f02bfb3eb2_512x288.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Yfd9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feca2e5b4-10a0-45eb-b133-36f02bfb3eb2_512x288.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><p><br><em>Robot wars vs Robot Soccer</em></p><p>Threats and SOCs will become more automated for sure. As they automate, they become faster, so each side has to increase its own level of automation to keep up. But when automation limits are reached, the humans on the threat side must apply that lateral thinking to find other avenues to exploit. They need to take the&nbsp;<a href="https://en.wikipedia.org/wiki/Kobayashi_Maru">Kirk approach to Kobayashi Maru</a>. When this happens, the humans on the defense side become critical. They need to figure out what is happening and create new ways to fight against the new methods.</p><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tDxh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e254269-cdb8-4a1a-bf03-09a64b5d73cc_512x242.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tDxh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e254269-cdb8-4a1a-bf03-09a64b5d73cc_512x242.jpeg 424w, https://substackcdn.com/image/fetch/$s_!tDxh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e254269-cdb8-4a1a-bf03-09a64b5d73cc_512x242.jpeg 848w, https://substackcdn.com/image/fetch/$s_!tDxh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e254269-cdb8-4a1a-bf03-09a64b5d73cc_512x242.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!tDxh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e254269-cdb8-4a1a-bf03-09a64b5d73cc_512x242.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tDxh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e254269-cdb8-4a1a-bf03-09a64b5d73cc_512x242.jpeg" width="320" height="151" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0e254269-cdb8-4a1a-bf03-09a64b5d73cc_512x242.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:151,&quot;width&quot;:320,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!tDxh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e254269-cdb8-4a1a-bf03-09a64b5d73cc_512x242.jpeg 424w, https://substackcdn.com/image/fetch/$s_!tDxh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e254269-cdb8-4a1a-bf03-09a64b5d73cc_512x242.jpeg 848w, https://substackcdn.com/image/fetch/$s_!tDxh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e254269-cdb8-4a1a-bf03-09a64b5d73cc_512x242.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!tDxh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e254269-cdb8-4a1a-bf03-09a64b5d73cc_512x242.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><p>So,&nbsp;humans will still be necessary on both sides.&nbsp;Of course,&nbsp;the operational involvement will be greatly reduced, again, on both sides. But they will be there, waiting&nbsp;to react&nbsp;against the innovation introduced by their counterparts on the other side.</p><p>This may be&nbsp;an&nbsp;anticlimactic&nbsp;conclusion, and it is. But there are some interesting follow up conversations to have. The number of humans required, their skills and how they are engaged will be different. What does it mean for outsourcing? Do end users still need people on their side? If solution providers engage this problem in a smart&nbsp;way,&nbsp;we may be able to remove, or greatly reduce,&nbsp;the need for humans on the end user organization side, for example. The remaining humans would be on the vendor side, adapting the tools to react against the latest attacks. For the end user organization, the result may look very similar to full automation, as they would not need to add&nbsp;<em><strong>their</strong></em>&nbsp;humans to the mix. Will we end up with the&nbsp;mythical&nbsp;"SOC in a box"? Future will tell.</p>]]></content:encoded></item></channel></rss>