incident response

December 16, 2016

PARTNER

Why Your Security Practice Must Include Incident Response Services

Even if you didn’t realize that managing cybersecurity threat risk is a major concern for our customers, the market potential should tell you something:  according to Gartner, worldwide spending on information security products and services will reach $81.6 billion in 2016.  Clearly, organizations a…

December 5, 2016

SECURITY

Customer-focused Incident Response Service

In our highly connected business environments, the need to respond to the inevitable security breach is on the minds of every CISO.  An increasing number of organizations rely on the services of a Managed Detection and Response (MDR) provider.  According to the Cisco 2016 Annual Security Report, 42…

November 28, 2016

SECURITY

What’s in Your Incident Response Go-Bag?

October was National Cyber Security Awareness month and there’s been a lot of talk about how organizations should be doing more to protect their networks. One of the current trends in cyber security is that organizations are increasingly turning to trusted partners like Cisco for some or all of thei…

November 7, 2016

SECURITY

Is Your Race to SOC Headed for an Epic Crash?

Before You Take Off, Get Up To Speed on These Six Precursors to Incident Response It seems most advice on setting up a Security Operations Center (SOC), or creating a Computer Security Incident Response Team (CSIRT), focuses on people, technology or processes. Unfortunately, such advice may also in…

October 19, 2016

SECURITY

Combatting Cybercrime with an Incident Response Plan

Based on the cybersecurity news proliferating in the mainstream media today – from ransomware incidents to data breaches of massive proportions – it has become clear that organizations need to put security mechanisms in place to protect their IT infrastructure. Organizations commonly use anti-virus,…

September 9, 2016

SECURITY

Ransomware: The race you don’t want to lose

In the race to detect and contain ransomware on their networks, many organizations fail before they are out of the gate.  The reason has very little to do with technology, and more so a great deal to do with process. “But we bought all the good tools!”, such organizations protest. Good security tech…

August 9, 2016

SECURITY

The Haves & Have Nots: Threat Management Maturity

IT departments regularly ask us questions about their security posture, their security concerns, and specifically, the makeup of their Threat Management (TM) organizations. Generally speaking, Threat Management includes anything in the Intel-Detection-Response arena, generally encompassing Security…

August 3, 2016

SECURITY

A “quick” guide to QUIC

Intelligence Gathering 101 Traffic analysis is rapidly becoming critical for threat analysis and incident response teams, and a choke point on their capability to be effective. Performing analysis on incoming threats requires security professionals to have monitoring tools that can give them an unde…

July 6, 2016

SECURITY

NetFlow AND PCAP (not or)

As digital transformation sweeps across the world, there is a driving need for more effective logging and data recording for incident response. In today’s IT world, your agency’s Computer Incident Response Team (CIRT) must have the capability to quickly determine the source and scope of an attack on…