Insource or Outsource the SOC

These days attacks are becoming more sophisticated and more common. Mobile devices, cloud computing and the Internet of Things have increased the number of access points that must be secured. To[…]

Read More

The Top Seven Steps for Conducting a Post-Mortem Following a Security Incident

For most employees, the incident is over. The threat has been contained and neutralized, the technical staff has gone home, and management has handled the damage control as best they can. If you[…]

Read More

Use Email for Messages, Not for Incident Management

As a CISO, you know how difficult it is to recruit the best staff. Once you bring them on board, you must also work to retain them — after all, their skills are in short supply, and your[…]

Read More

Top 10 Best Practices for Cyberbreach Post-Crisis Communication

 

According to an article appearing in AT&T Cybersecurity Insights, 62 percent of all organizations surveyed admitted that they had suffered a breach in 2015. Furthermore, although 42 percent[…]

Read More

6 Questions You Must Ask for a Successful Incident Response

For most organizations, suffering a cyberattack is not a matter of “if” – it is a matter of “when.” Today’s hackers have more technology and are more persistent than ever before. Lately they seem[…]

Read More

Data Breach Handling Best Practices

Introduction

A data breach could happen to anyone. Data managed by your company is valuable to someone, no matter what the data is. Everything has a price tag on the dark web. It is especially[…]

Read More

Proactive Hunting: Hunt With a Plan, Structure and Automation

To improve the security posture and to detect advanced threats organizations needs to embrace proactive hunting on their networks, as part of their regular security activities.

This article is not[…]

Read More

Streamline and Scale Your Enterprise SOC with Automation and Collaboration

The ever-persistent threat landscape poses risks to virtually any organization’s operations and bottom line. The question is not if your organization will be attacked, but when. There is clearly a[…]

Read More

Why Is Your Board of Directors Finally Asking About Cyber Risks?

Here is a great article about how the awareness of Cyber Risk is increasing at the board level. The biggest reason is the recent focus by SEC on enforcing the cyber security standards. This can help[…]

Read More

Securing Collaboration and Collaborating towards better Security

Technologies like Slack make sharing content among teams much easier and more fun. As with any new technology when it comes to security they create new challenges and with this particular[…]

Read More