Cybersecurity And The IoT: From Incident Response To Continuous Response

There’s no doubt the Internet of Things (IoT) will eventually take over the digital universe. By 2020, IDC predicts there will be more than 210 billion connected devices available, with at least[…]

Read More

SOC Challenge #14: Filtering Out the Cyber Alert "False Positives"

Modern organizations must deal with a virtual tsunami of security alerts on a daily basis. In a recent survey, 10 percent of the respondents reported that they dealt with more than 50,000 alerts[…]

Read More

Top Quotes from "Mr. Robot" that SOC Managers will Understand

Below are some security best practices as told by Mr. Robot – the popular TV series about hacking, currently wrapping up its second season. By taking such simple steps, security professionals can[…]

Read More

Lessons Security Professionals Can Learn from "Mr. Robot"

It is not often that movies and television shows give viewers the opportunity to explore the world of hacking and digital security in a realistic manner. After two seasons, "Mr. Robot" has[…]

Read More

Incident Response in the Age of Cloud

Most CISOs receive a rude awakening when they encounter their first major security issue in the cloud. If they identify a critical vulnerability that requires a patch, they may not have the[…]

Read More

Digital Forensics and Incident Response Community Resource

In a previous life, I was involved in the DevOps and Docker communities.

I was really impressed by the amount of quality content in those areas, and the amazing communities around that space, that[…]

Read More

How to Draft an Effective Security Incident Response Plan

When it comes to incident response and a company’s ability to manage a data breach, no organization wants to be caught off guard. The effects of an uncontrolled and poorly managed data breach can[…]

Read More

6 Questions You Must Ask for a Successful Incident Response

For most organizations, suffering a cyberattack is not a matter of “if” – it is a matter of “when.” Today’s hackers have more technology and are more persistent than ever before. Lately they seem[…]

Read More

5 Steps to an Effective Data Incident Response Program

If your organization depends on its data to carry out normal business operations, you probably can’t afford to go without an incident response program. A comprehensive incident response plan will[…]

Read More

5 Steps in Breach Notification That Should Be Part Of Your Incident Response Plan

Many businesses treat breach notification protocols as part of their mandatory compliance obligations, and as such this part of the process often comes across as an afterthought to a concerned[…]

Read More