Articles
Threat Hunting: How to Gain the Most Value
Sean Mason, Director of Cisco Incident Response Services and Jeff Bollinger, Investigations Manager, Cisco Security Incident Response Team (CSIRT) As security practitioners who continuously look for adversarial malice, one of the questions we are asked frequently is: What’s around the corner? Threat…
Increase Your Security Resiliency with Enhanced Incident Response Retainer Services
It’s been a fun and exciting four years at Cisco building out our market-leading Incident Response service, and the one thing I continually focus on is not resting on our laurels. That’s why I’m really excited to announce that moving forward, we are enhancing our Incident Response Retainer offering…
Cisco Recognized as a Leader in Incident Response
It is never ideal to “go it alone” during a cybersecurity breach. Talk about a high-pressure situation. Getting access to experts is critical: with a strong support team, you’ll have more hands on deck so you can act quickly, and when you tap into skilled incident response experts, you have the ben…
Top 5 Recommendations from Cisco Incident Response Engagements
Lately, there are days I wake up and find it hard to believe it’s been 3 years since we began our Incident Response (IR) practice within Cisco’s walls. Coming in on the ground floor of such a monumental and important offering to our customers gave us the unique opportunity to define and shape our pr…
Incident Response Fundamentals – Communication
While there are a number of ways to err during the course of responding to an incident, it never seems to fail that the number one misstep I have continued to see comes down to internal communications among those working on the incident and communications to stakeholders. To that point, it’s astonis…
Is it time to hire cybersecurity guardians for the network?
Another day, another hack. It seems like every time we turn on the news, we are hearing about another company that has been breached. Hackers are not going away and are getting progressively sophisticated as companies struggle to equip their security teams with the tools and expertise to protect the…
Combatting Cybercrime with an Incident Response Plan
Based on the cybersecurity news proliferating in the mainstream media today – from ransomware incidents to data breaches of massive proportions – it has become clear that organizations need to put security mechanisms in place to protect their IT infrastructure. Organizations commonly use anti-virus,…
The Haves & Have Nots: Threat Management Maturity
IT departments regularly ask us questions about their security posture, their security concerns, and specifically, the makeup of their Threat Management (TM) organizations. Generally speaking, Threat Management includes anything in the Intel-Detection-Response arena, generally encompassing Security…
Incident Response Goes to Hollywood
Having personally spent a lot of time at Fortune 500’s, I know that individuals tend to develop blinders when dedicated to an organization, and begin to accept that things are done a certain way, and there is an order about things. It may come as a surprise then, when others don’t do things the way…