Aug. 30, 2023, 11:42 p.m. | Anton Chuvakin

Security Boulevard securityboulevard.com

So, if you are too busy to read our amazing (duh!) new blog “Revisiting Traditional Security Advice for Modern Threats”, here are the key ideas from it.



  1. At some point, a “pre-owned” (compromised before you ever saw it) email security appliance, firewall, or a piece of software will show up in your environment (you no longer need to be this elite for it; it ain’t 2013).

  2. You will not detect this, in all likelihood. You really won’t, …

advice blog compromised cybersecurity detection and response email email security firewall ideas key piece point practices security security advice software the key threat threat detection threats

Security Analyst

@ Northwestern Memorial Healthcare | Chicago, IL, United States

GRC Analyst

@ Richemont | Shelton, CT, US

Security Specialist

@ Peraton | Government Site, MD, United States

Information Assurance Security Specialist (IASS)

@ OBXtek Inc. | United States

Cyber Security Technology Analyst

@ Airbus | Bengaluru (Airbus)

Vice President, Cyber Operations Engineer

@ BlackRock | LO9-London - Drapers Gardens