News

Anton’s Security Blog Quarterly Q2 2025

  • None--securityboulevard.com
  • published date: 2025-06-24 00:00:00 UTC

None

<p>Amazingly, Medium has fixed the stats so my blog/podcast quarterly is back to life. <a href="https://medium.com/anton-on-security/antons-security-blog-quarterly-q3-2023-fcad66cbbca0">As before</a>, this covers both <a href="https://medium.com/anton-on-security">Anton on Security</a> and my posts from <a href="https://cloud.google.com/blog/">Google Cloud blog</a>, and our <a href="https://cloud.withgoogle.com/cloudsecurity/podcast/">Cloud Security Podcast</a> (<a href="https://open.spotify.com/show/12WPC7aW5kd0kKSyrpgnHI">subscribe</a>).</p><figure><img decoding="async" alt="" src="https://cdn-images-1.medium.com/max/1024/0*RzO0W4b_Y7dg7eRy"></figure><p><strong>Top 10 posts with the most lifetime views (excluding paper announcement blogs):</strong></p><ol> <li><a href="https://medium.com/anton-on-security/antons-alert-fatigue-the-study-0ac0e6f5621c'">Anton’s Alert Fatigue: The Study</a><strong> </strong>[<em>A.C. — wow, this is #1 now! awesome!</em>]</li> <li><a href="https://medium.com/anton-on-security/security-correlation-then-and-now-a-sad-truth-about-siem-fc5a1afb1001">Security Correlation Then and Now: A Sad Truth About SIEM</a></li> <li><a href="https://medium.com/anton-on-security/can-we-have-detection-as-code-96f869cfdc79">Can We Have “Detection as Code”?</a></li> <li><a href="https://medium.com/anton-on-security/detection-engineering-is-painful-and-it-shouldnt-be-part-1-3641d8740458">Detection Engineering is Painful — and It Shouldn’t Be (Part 1)</a></li> <li><a href="https://medium.com/anton-on-security/back-in-2015-while-working-on-a-gartner-soc-paper-i-coined-the-concept-of-soc-nuclear-triad-8961004c734">Revisiting the Visibility Triad for 2020</a> (update for 2025 is coming soon)</li> <li><a href="https://medium.com/anton-on-security/beware-clown-grade-socs-still-abound-7b6b9d1f9304">Beware: Clown-grade SOCs Still Abound</a></li> <li><a href="https://medium.com/anton-on-security/why-is-threat-detection-hard-42aa479a197f%5D">Why is Threat Detection Hard?</a></li> <li><a href="https://medium.com/anton-on-security/a-soc-tried-to-detect-threats-in-the-cloud-your-wont-believe-what-happened-next-4a2ba0ab5d81">A SOC Tried To Detect Threats in the Cloud … You Won’t Believe What Happened Next</a></li> <li><a href="https://medium.com/anton-on-security/one-of-the-most-common-questions-i-received-in-my-analyst-years-of-covering-siem-and-other-3480cb755a3e">Top 10 SIEM Log Sources in Real Life?</a> [<a href="https://medium.com/anton-on-security/one-more-time-on-siem-telemetry-log-sources-b0a88572dac9">updated/modified version</a>]</li> <li><a href="https://medium.com/anton-on-security/how-to-think-about-threat-detection-in-the-cloud-1baff902afe5">How to Think about Threat Detection in the Cloud</a></li> </ol><p><strong>Top 5 posts with paper announcements:</strong></p><div class="code-block code-block-12 ai-track" data-ai="WzEyLCIiLCJCbG9jayAxMiIsIiIsMV0=" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-12-1" data-info="WyIxMi0xIiwyXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="VGVjaHN0cm9uZyBHYW5nIFlvdXR1YmU=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://youtu.be/Fojn5NFwaw8" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2024/12/Techstrong-Gang-Youtube-PodcastV2-770.png" alt="Techstrong Gang Youtube"></a></div> <div class="clear-custom-ad"></div> </div></div> <div class="ai-rotate-option" style="visibility: hidden; position: absolute; top: 0; left: 0; width: 100%; height: 100%;" data-index="1" data-name="QVdTIEh1Yg==" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://devops.com/builder-community-hub/?ref=in-article-ad-1&amp;utm_source=do&amp;utm_medium=referral&amp;utm_campaign=in-article-ad-1" target="_blank"><img src="https://devops.com/wp-content/uploads/2024/10/Gradient-1.png" alt="AWS Hub"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div><ul> <li><a href="https://medium.com/anton-on-security/new-paper-future-of-the-soc-soc-people-skills-not-tiers-7fbe09001096">New Paper: “Future of the SOC: SOC People — Skills, Not Tiers”</a></li> <li><a href="https://medium.com/anton-on-security/new-paper-future-of-the-soc-evolution-or-optimization-choose-your-path-paper-4-of-4-5-1eb477ea8d25">New Paper: “Future of the SOC: Evolution or Optimization — Choose Your Path” (Paper 4 of 4.5)</a> (one more paper coming in 2025)</li> <li><a href="https://medium.com/anton-on-security/new-paper-future-of-the-soc-forces-shaping-modern-security-operations-8d7b221bc326">New Paper: “Future of the SOC: Forces shaping modern security operations”</a></li> <li><a href="https://medium.com/anton-on-security/new-paper-future-of-the-soc-process-consistency-and-creativity-a-delicate-balance-paper-3-of-f73fe653c04d">New Paper: “Future Of The SOC: Process Consistency and Creativity: a Delicate Balance” (Paper 3 of 4)</a></li> <li><a href="https://medium.com/anton-on-security/new-paper-autonomic-security-operations-10x-transformation-of-the-security-operations-center-daf779fc4a30">New Paper: “Autonomic Security Operations — 10X Transformation of the Security Operations Center”</a> (the classic 2021 ASO paper!)</li> <li><a href="https://medium.com/anton-on-security/new-paper-future-of-soc-transform-the-how-paper-5-0de3caa72971">New Paper: “Future of SOC: Transform the ‘How’” (Paper 5)</a></li> <li><a href="https://medium.com/anton-on-security/new-paper-securing-ai-similar-or-different-91f3bdac1eff">New Paper: “Securing AI: Similar or Different?“</a> (update for 2025 coming soon!)</li> </ul><p><strong>NEW: recent 3 fun posts, must-read:</strong></p><ul> <li><a href="https://medium.com/anton-on-security/antons-alert-fatigue-the-study-0ac0e6f5621c">Anton’s Alert Fatigue: The Study</a> (long!)</li> <li><a href="https://medium.com/anton-on-security/a-brief-guide-for-dealing-with-humanless-soc-idiots-3c2f1a5b26e9">A Brief Guide for Dealing with ‘Humanless SOC’ Idiots</a></li> <li><a href="https://medium.com/anton-on-security/the-return-of-the-baby-aso-why-socs-still-suck-07e66f2ee023">The Return of the Baby ASO: Why SOCs Still Suck?</a></li> <li><a href="https://medium.com/anton-on-security/15-years-of-loading-threat-intel-into-siem-why-does-this-still-suck-37e5e5653828">15+ Years of Loading Threat Intel into SIEM: Why Does This Still Suck?</a></li> </ul><p><strong>Top 7 </strong><a href="https://cloud.withgoogle.com/cloudsecurity/podcast/"><strong>Cloud Security Podcast by Google</strong></a><strong> episodes (excluding the oldest 3!):</strong></p><div class="code-block code-block-15" style="margin: 8px 0; clear: both;"> <script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2091799172090865" crossorigin="anonymous" type="592ec107e503b12ed9b69233-text/javascript"></script> <!-- SB In Article Ad 1 --> <ins class="adsbygoogle" style="display:block" data-ad-client="ca-pub-2091799172090865" data-ad-slot="8723094367" data-ad-format="auto" data-full-width-responsive="true"></ins> <script type="592ec107e503b12ed9b69233-text/javascript"> (adsbygoogle = window.adsbygoogle || []).push({}); </script></div><ol> <li><a href="https://cloud.withgoogle.com/cloudsecurity/podcast/ep75-how-we-scale-detection-and-response-at-google-automation-metrics-toil/">EP75 How We Scale Detection and Response at Google: Automation, Metrics, Toil</a> (our best episode! officially!)</li> <li><a href="https://cloud.withgoogle.com/cloudsecurity/podcast/zero-trust-fast-forward-from-2010-to-2021/">EP8 Zero Trust: Fast Forward from 2010 to 2021</a></li> <li><a href="https://cloud.withgoogle.com/cloudsecurity/podcast/modern-threat-detection-at-google/">EP17 Modern Threat Detection at Google</a></li> <li><a href="https://cloud.withgoogle.com/cloudsecurity/podcast/ep47-megatrends-macro-changes-microservices-oh-my-changes-in-2022-and-beyond-in-cloud-security/">EP47 “Megatrends, Macro-changes, Microservices, Oh My! Changes in 2022 and Beyond in Cloud Security”</a></li> <li><a href="https://cloud.withgoogle.com/cloudsecurity/podcast/ep153-kevin-mandia-on-cloud-breaches-new-threat-actors-old-mistakes-and-lessons-for-all/">EP153 Kevin Mandia on Cloud Breaches: New Threat Actors, Old Mistakes, and Lessons for All</a></li> <li><a href="https://cloud.withgoogle.com/cloudsecurity/podcast/ep109-how-google-does-vulnerability-management-the-not-so-secret-secrets/">EP109 How Google Does Vulnerability Management: The Not So Secret Secrets!</a></li> <li><a href="https://cloud.withgoogle.com/cloudsecurity/podcast/ep150-taming-the-ai-beast-threat-modeling-for-modern-ai-systems-with-gary-mcgraw/">EP150 Taming the AI Beast: Threat Modeling for Modern AI Systems with Gary McGraw</a></li> </ol><p>Now, fun posts by topic.</p><p><strong>Security operations / detection &amp; response:</strong></p><ul> <li><a href="https://medium.com/anton-on-security/security-correlation-then-and-now-a-sad-truth-about-siem-fc5a1afb1001">“Security Correlation Then and Now: A Sad Truth About SIEM”</a></li> <li>“<a href="https://medium.com/anton-on-security/migrate-off-that-old-siem-already-0740b735a288">Migrate Off That Old SIEM Already!</a>” (<a href="https://youtu.be/S-11_syclZ8?si=UBSjhceqF6FBBp4N">VIDEO!</a>)</li> <li><a href="https://www.googlecloudcommunity.com/gc/Community-Blog/The-SOC-Metrics-that-Matter-or-Do-They/ba-p/873173">“Measuring the SOC: What Counts and What Doesn’t in 2025?”</a> (Google Cloud Blog)</li> <li><a href="https://medium.com/anton-on-security/can-we-have-detection-as-code-96f869cfdc79">“Can We Have “Detection as Code”?”</a></li> <li><a href="https://medium.com/anton-on-security/back-in-2015-while-working-on-a-gartner-soc-paper-i-coined-the-concept-of-soc-nuclear-triad-8961004c734">“Revisiting the Visibility Triad for 2020”</a></li> <li>“<a href="https://medium.com/anton-on-security/beware-clown-grade-socs-still-abound-7b6b9d1f9304">Beware: Clown-grade SOCs Still Abound</a>”</li> <li><a href="https://medium.com/anton-on-security/why-is-threat-detection-hard-42aa479a197f">“Why is Threat Detection Hard?”</a></li> <li><a href="https://medium.com/anton-on-security/a-soc-tried-to-detect-threats-in-the-cloud-your-wont-believe-what-happened-next-4a2ba0ab5d81">“A SOC Tried To Detect Threats in the Cloud … You Won’t Believe What Happened Next”</a></li> <li><a href="https://medium.com/anton-on-security/stop-trying-to-take-humans-out-of-soc-except-wait-wait-wait-e19c5887ef2f">“Stop Trying to Take Humans Out of SOC … Except … Wait… Wait… Wait…”</a></li> <li><a href="https://medium.com/anton-on-security/one-of-the-most-common-questions-i-received-in-my-analyst-years-of-covering-siem-and-other-3480cb755a3e">“Top 10 SIEM Log Sources in Real Life?”</a> (<a href="https://medium.com/anton-on-security/one-more-time-on-siem-telemetry-log-sources-b0a88572dac9">NEWER VERSION</a>)</li> <li><a href="https://medium.com/p/992bfe095334">“Debating SIEM in 2023, Part 1”</a></li> <li><a href="https://medium.com/anton-on-security/debating-siem-in-2023-part-2-4f46e93faaf0">“Debating SIEM in 2023, Part 2”</a></li> <li><a href="https://medium.com/anton-on-security/log-centralization-the-end-is-nigh-b28efaa98379">“Log Centralization: The End Is Nigh?”</a></li> <li><a href="https://medium.com/anton-on-security/how-to-make-threat-detection-better-c38f1758b842">“How to Make Threat Detection Better?”</a></li> <li><a href="https://medium.com/anton-on-security/siem-content-false-positives-and-engineering-or-not-security-4a1dfecc136c">“SIEM Content, False Positives and Engineering (Or Not) Security”</a></li> <li><a href="https://cloud.google.com/blog/products/identity-security/modern-secops-masterclass-now-available-on-coursera">“Modern SecOps Masterclass: Now Available on Coursera”</a></li> </ul><p>(if you only read one, choose <a href="https://medium.com/anton-on-security/can-we-have-detection-as-code-96f869cfdc79">this one</a>!)</p><p><strong>Cloud security:</strong></p><ul> <li><a href="https://medium.com/anton-on-security/using-cloud-securely-the-config-doom-question-36e7e9c018e2">“Using Cloud Securely — The Config Doom Question”</a></li> <li><a href="https://medium.com/anton-on-security/who-does-what-in-cloud-threat-detection-a7a4f44e7672">“Who Does What In Cloud Threat Detection?”</a></li> <li><a href="https://medium.com/anton-on-security/how-to-solve-the-mystery-of-cloud-defense-in-depth-84e1db3d6276">“How to Solve the Mystery of Cloud Defense in Depth?”</a></li> <li><a href="https://medium.com/anton-on-security/does-the-world-need-cloud-detection-and-response-cdr-ea184e6df9f3">“Does the World Need Cloud Detection and Response (CDR)?”</a></li> <li><a href="https://medium.com/anton-on-security/use-cloud-securely-what-does-this-even-mean-b723cf01f834">“Use Cloud Securely? What Does This Even Mean?!”</a></li> <li><a href="https://cloud.google.com/blog/products/identity-security/why-cisos-need-to-adapt-their-mental-models-of-security-for-cloud">“How CISOs need to adapt their mental models for cloud security”</a> [GCP blog]</li> <li><a href="https://medium.com/anton-on-security/who-does-what-in-cloud-threat-detection-a7a4f44e7672">“Who Does What In Cloud Threat Detection?”</a></li> <li><a href="https://medium.com/anton-on-security/cloud-migration-security-woes-14d7301b9e3b">“Cloud Migration Security Woes”</a></li> <li><a href="https://medium.com/anton-on-security/move-to-cloud-a-chance-to-finally-transform-security-e9614aae4f9c">“Move to Cloud: A Chance to Finally Transform Security?”</a></li> <li><a href="https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-multicloud-jungle-how-your-security-can-survive-thrive">“It’s a multicloud jungle out there. Here’s how your security can survive“</a></li> </ul><p>(if you only read one, choose <a href="https://medium.com/anton-on-security/use-cloud-securely-what-does-this-even-mean-b723cf01f834">this one</a>!)</p><p><strong>How Google Does Security (HGD):</strong></p><ul> <li><a href="https://cloud.google.com/transform/how-google-does-it-modernizing-threat-detection/">“How Google Does It: Making threat detection high-quality, scalable, and modern”</a> (Google Cloud blog)</li> <li><a href="https://cloud.google.com/transform/how-google-does-it-secure-our-own-cloud">“How Google Does It: How we secure our own cloud” </a>(Google Cloud blog)</li> <li><a href="https://cloud.google.com/transform/how-google-does-it-vulnerability-detection-remediation">“How Google Does It: Finding, tracking, and fixing vulnerabilities”</a> (Google Cloud blog)</li> <li><a href="https://cloud.google.com/transform/how-google-does-it-vulnerability-detection-remediation">“How Google Does It: Finding, tracking, and fixing vulnerabilities”</a> (Google Cloud blog)</li> <li><a href="https://cloud.google.com/transform/how-google-does-it-red-teaming-at-scale">“How Google Does It: Red teaming at scale”</a> (Google Cloud blog)</li> </ul><p>(if you only read one, choose <a href="https://cloud.google.com/transform/how-google-does-it-modernizing-threat-detection/">this one!</a> BTW, we also have a lot of fun <a href="https://cloud.withgoogle.com/cloudsecurity/podcast/topics/podcast-list/?tag=how-google-does-security">HGD podcasts</a>)</p><p><strong>CISO, culture, transformation, FMC, etc</strong></p><ul> <li><a href="https://medium.com/anton-on-security/new-office-of-the-ciso-paper-organizing-security-for-digital-transformation-fae78ce61c48">“New Office of the CISO Paper: Organizing Security for Digital Transformation”</a> (and <a href="https://services.google.com/fh/files/misc/organizing_security_digital_transformation.pdf">paper</a>)</li> <li><a href="https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-10-ways-to-make-cyber-physical-systems-more-resilient">“10 ways to make cyber-physical systems more resilient”</a> (and <a href="https://services.google.com/fh/files/misc/ociso_pcast_paper_2024.pdf">paper</a>)</li> </ul><p><strong>AI security:</strong></p><ul> <li><a href="https://medium.com/anton-on-security/our-security-of-ai-papers-and-blogs-explained-7e50afc0469b">”Our Security of AI Papers and Blogs Explained</a>” [this has a whole lot of AI security fun links that you <em>so </em>want to click!]</li> <li><a href="https://www.googlecloudcommunity.com/gc/Community-Blog/Securing-AI-Supply-Chain-Like-Software-Only-Not/ba-p/867409">“Securing AI Supply Chain: Like Software, Only Not”</a> (Google Cloud blog)</li> <li><a href="https://cloud.google.com/transform/spotlighting-shadow-ai-how-to-protect-against-risky-ai-practices">“Spotlighting ‘shadow AI’: How to protect against risky AI practices”</a> (Google Cloud blog)</li> <li><a href="https://www.googlecloudcommunity.com/gc/Community-Blog/Shadow-AI-Strikes-Back-Enterprise-AI-Absent-Oversight-in-the-Age/ba-p/891738">“Shadow AI Strikes Back: Enterprise AI Absent Oversight in the Age of Gen AI”</a></li> <li>“<a href="https://medium.com/anton-on-security/no-deep-ai-security-secrets-in-this-post-d9af9e38b7a0">No Deep AI Security Secrets In This Post!</a>”</li> <li>“<a href="https://medium.com/anton-on-security/new-paper-securing-ai-similar-or-different-91f3bdac1eff">New Paper: “Securing AI: Similar or Different?“</a></li> <li><a href="https://cloud.google.com/blog/transform/prompt-what-think-about-when-youre-thinking-about-securing-ai">“The Prompt: What to think about when you’re thinking about securing AI”</a> (Google Cloud blog)</li> <li><a href="https://cloud.google.com/transform/gen-ai-governance-10-tips-to-level-up-your-ai-program">“Gen AI governance: 10 tips to level up your AI program”</a> (Google Cloud blog)</li> <li><a href="https://www.googlecloudcommunity.com/gc/Community-Blog/AI-Adoption-Learning-from-the-Cloud-s-Early-Days/ba-p/880518">“AI Adoption: Learning from the Cloud’s Early Days”</a> (Google Community blog)</li> <li><a href="https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-how-google-secures-ai-agents/?e=48754805">“How Google secures AI Agents”</a> (Google Cloud blog)</li> <li><a href="https://www.googlecloudcommunity.com/gc/Community-Blog/Demystifying-AI-Security-New-Paper-on-Real-World-SAIF/ba-p/891736">“Demystifying AI Security: New Paper on Real-World SAIF Applications”</a></li> <li><a href="https://cloud.google.com/blog/transform/to-securely-build-ai-on-google-cloud-follow-these-best-practices-infographic/">“To securely build AI on Google Cloud, follow these best practices”</a> (Google Cloud blog)</li> <li><a href="https://cloud.google.com/transform/oops-5-serious-gen-AI-security-mistakes-to-avoid/">“Oops! 5 serious gen AI security mistakes to avoid”</a> (Google Cloud blog)</li> <li><a href="https://cloud.google.com/transform/3-new-ways-ai-security-sidekick">“3 new ways to use AI as your security sidekick”</a> (Google Cloud blog)</li> </ul><p>(if you only read one, choose <a href="https://medium.com/anton-on-security/our-security-of-ai-papers-and-blogs-explained-7e50afc0469b">this one</a>!)</p><p><strong>NEW: fun presentations shared:</strong></p><ul> <li><a href="https://www.slideshare.net/slideshow/detection-engineering-maturity-helping-siems-find-their-adulting-skills/273410613">Detection Engineering Maturity — Helping SIEMs Find Their Adulting Skills</a> (2024)</li> <li><a href="https://www.slideshare.net/slideshow/future-of-soc-more-security-less-operations/267023230">Future of SOC: More Security, Less Operations</a> (2024)</li> <li><a href="https://www.slideshare.net/slideshow/soc-meets-cloud-what-breaks-what-changes-what-to-do/267023131">SOC Meets Cloud: What Breaks, What Changes, What to Do?</a> (2023)</li> <li><a href="https://www.slideshare.net/slideshow/meet-the-ghost-of-secops-future-by-anton-chuvakin/265076828">Meet the Ghost of SecOps Future</a> (2023)</li> <li><a href="https://www.slideshare.net/slideshow/sans-webinar-the-future-of-log-centralization-for-siems-and-dfir-is-the-end-nigh/260341650'">The Future of Log Centralization for SIEMs and DFIR — Is the End Nigh?</a> (2023)</li> <li><a href="https://www.slideshare.net/slideshow/20-years-of-siem-sans-webinar-2022/251485935">20 Years of SIEM (2022)</a></li> </ul><p>Enjoy!</p><p><strong>Previous posts in this series:</strong></p><ul> <li><a href="https://medium.com/anton-on-security/antons-security-blog-quarterly-q1-2025-d8906386503c">Anton’s Security Blog Quarterly Q1 2025</a></li> <li><a href="https://medium.com/anton-on-security/antons-security-blog-quarterly-q4-2024-076ea73bf84b">Anton’s Security Blog Quarterly Q4 2024</a></li> <li><a href="https://medium.com/anton-on-security/antons-security-blog-quarterly-q3-2024-8075a17e1d98">Anton’s Security Blog Quarterly Q3 2024</a></li> <li><a href="https://medium.com/anton-on-security/antons-security-blog-quarterly-q2-2024-3cd15ddc5e6f">Anton’s Security Blog Quarterly Q2 2024</a></li> <li><a href="https://medium.com/anton-on-security/antons-security-blog-quarterly-q1-2024-lite-08ae41772609">Anton’s Security Blog Quarterly Q1 2024 Lite</a></li> <li><a href="https://medium.com/anton-on-security/antons-security-blog-quarterly-q3-2023-fcad66cbbca0">Anton’s Security Blog Quarterly Q3 2023</a></li> <li><a href="https://medium.com/anton-on-security/antons-security-blog-quarterly-q2-2023-571b1d4c0b92">Anton’s Security Blog Quarterly Q2 2023</a></li> <li><a href="https://medium.com/anton-on-security/antons-security-blog-quarterly-q1-2023-5c378b8ce5c9">Anton’s Security Blog Quarterly Q1 2023</a></li> <li><a href="https://medium.com/anton-on-security/antons-security-blog-quarterly-q4-2022-97494f05695a">Anton’s Security Blog Quarterly Q4 2022</a></li> <li><a href="https://medium.com/anton-on-security/antons-security-blog-quarterly-q3-2022-c834a1b7fc6d">Anton’s Security Blog Quarterly Q3 2022</a></li> <li><a href="https://medium.com/anton-on-security/antons-security-blog-quarterly-q2-2022-d245b406569d">Anton’s Security Blog Quarterly Q2 2022</a></li> <li><a href="https://medium.com/anton-on-security/antons-security-blog-quarterly-q1-2022-300a70f4bb8a">Anton’s Security Blog Quarterly Q1 2022</a></li> <li><a href="https://medium.com/anton-on-security/antons-security-blog-quarterly-q4-2021-6abe22d2e01f">Anton’s Security Blog Quarterly Q4 2021</a></li> <li><a href="https://medium.com/anton-on-security/antons-security-blog-quarterly-q3-2021-3259ff665b91">Anton’s Security Blog Quarterly Q3 2021</a></li> <li><a href="https://medium.com/anton-on-security/antons-security-blog-quarterly-q2-2021-be4f598f5fae">Anton’s Security Blog Quarterly Q2 2021</a></li> <li><a href="https://medium.com/anton-on-security/antons-security-blog-quarterly-q1-2021-5572169ae801">Anton’s Security Blog Quarterly Q1 2021</a></li> <li><a href="https://medium.com/anton-on-security/antons-security-blog-quarterly-q3-5-2020-5e0db0114aff">Anton’s Security Blog Quarterly Q3.5 2020</a></li> </ul><p><img decoding="async" src="https://medium.com/_/stat?event=post.clientViewed&amp;referrerSource=full_rss&amp;postId=9b97cc9cd3b3" width="1" height="1" alt=""></p><hr><p><a href="https://medium.com/anton-on-security/antons-security-blog-quarterly-q2-2025-9b97cc9cd3b3">Anton’s Security Blog Quarterly Q2 2025</a> was originally published in <a href="https://medium.com/anton-on-security">Anton on Security</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p><div class="spu-placeholder" style="display:none"></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://medium.com/@anton.chuvakin?source=rss-11065c9e943e------2">Stories by Anton Chuvakin on Medium</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Anton Chuvakin">Anton Chuvakin</a>. Read the original post at: <a href="https://medium.com/anton-on-security/antons-security-blog-quarterly-q2-2025-9b97cc9cd3b3?source=rss-11065c9e943e------2">https://medium.com/anton-on-security/antons-security-blog-quarterly-q2-2025-9b97cc9cd3b3?source=rss-11065c9e943e------2</a> </p>