Anton Chuvakin

1.6K Followers
1.1K Following
251 Posts
"Google Cloud Security Threat Horizons Report #11 Is Out!" https://bit.ly/3PM6ced <- our new cloud threat report with (mostly!) same old - same old cloud issues -)
Google Cloud Security Threat Horizons Report #11 Is Out!

This is my completely informal, uncertified, unreviewed and otherwise completely unofficial blog inspired by my reading of our next Threat Horizons Report, #11 (full version) that we just released…

Anton on Security
"A Brief Guide for Dealing with ‘Humanless #SOC’ Idiots" https://bit.ly/3C6APbn <- it is kinda a joke post, yet as they say "there's a grain of truth in every joke"...
A Brief Guide for Dealing with ‘Humanless SOC’ Idiots

My former “colleagues” have written several serious pieces of research about why a SOC without humans will never happen (“Predict 2025: There Will Never Be an Autonomous SOC”, “The “Autonomous SOC”…

Anton on Security
"Securing Inherited Cloud: Top Lessons" https://bit.ly/4fYsmoh <- an extended version of our post on how to secure a cloud environment you inherited!
Google Cloud Office of the CISO 2024 Year in Review: AI Trust and Security https://bit.ly/3WhQB9Y <- a collection of fun (well, OK, they are not all fun!) things on securing AI we wrote in 2024
New Paper: “Future of #SOC: Transform the ‘How’” (Paper 5) https://bit.ly/4jmA7Ye <- follows the ideas from our "transform vs optimize" paper and gives a few tips on how to run the SOC project alongside another related effort (It is fun! I promise!)
New Paper: “Future of SOC: Transform the ‘How’” (Paper 5)

After a long, long, long writing effort … eh … break, we are ready with our 5th Deloitte and Google Cloud Future of the SOC paper “Future of SOC: Transform the ‘How’.” When facing the question of…

Anton on Security
"Anton’s Security Blog Quarterly Q4 2024" https://bit.ly/3ZLqKJA <- my slightly improved list of popular blogs, podcasts and presentations, curated by a human with some ideas from AI -)
Anton’s Security Blog Quarterly Q4 2024 - Anton on Security - Medium

Amazingly, Medium has fixed the stats so my blog/podcast quarterly is back to life. As before, this covers both Anton on Security and my posts from Google Cloud blog, and our Cloud Security Podcast…

Anton on Security
"Celebrating 200 Episodes of Cloud Security Podcast by Google and Thanks for all the Listens!" https://bit.ly/41iE2yG
Celebrating 200 Episodes of Cloud Security Podcast by Google and Thanks for all the Listens!

A few weeks ago, our podcast turned 200! In this case, we are talking about episodes, not years. We (that is, Tim Peacock and myself) definitely feel like we have to say something humorous, pithy…

Anton on Security
"Anton’s Alert Fatigue: The Study" https://bit.ly/3UJWBI1 is a result of some agonizing pondering of the "alert fatigue problem" over the years. Hopefully it is a fun read, because it was not a very fun write -)
Anton’s Alert Fatigue: The Study - Anton on Security - Medium

Mention “alert fatigue” to a SOC analyst. They would immediately recognize what you are talking about. Now, take your time machine to 2002. Find a SOC analyst (much fewer of those around, to be sure…

Anton on Security
"Get an Untrusted Security Advisor! Have Fun, Reduce Fail!" https://bit.ly/3BMaajh <- a collection on random, incomplete thoughts about some uses of #GenAI (#LLM really) for security. Not meant to be comprehensive or (very) analytical, so please no "YOU MISSED <this>" comments :-)
Get an Untrusted Security Advisor! Have Fun, Reduce Fail!

Many organizations are looking for trusted advisors, and this applies to our beloved domain of cyber/information security. If you look at LinkedIn, many consultants present themselves as trusted…

Anton on Security

@darkuncle for the very least, the articles that I've seen have multiple red flags:
* "Military grade encryption": not a term cryptographers use, ever.
* Breaking both RSA and AES: no known plausible mechanism to break both with the same approach
* Details withheld due to sensitivity: there are zero knowledge proofs (well sorta, slight abuse of terminology here) you could give (for both AES and RSA) that would show that you have this capability. For example, sign something with the RSA2048 challenge number, or reveal the AES key of a plaintext/ciphertext pair that is generated by a trusted non colluding third party. You wouldn't reveal anything about your methods, but you would show that you have the capability.

Extraordinary claims require extraordinary evidence. And I haven't even been able to access the paper so far, so I do not see the extraordinary evidence.