incident response
Why Your Security Practice Must Include Incident Response Services
Even if you didn’t realize that managing cybersecurity threat risk is a major concern for our customers, the market potential should tell you something: according to Gartner, worldwide spending on information security products and services will reach $81.6 billion in 2016. Clearly, organizations a…
Customer-focused Incident Response Service
In our highly connected business environments, the need to respond to the inevitable security breach is on the minds of every CISO. An increasing number of organizations rely on the services of a Managed Detection and Response (MDR) provider. According to the Cisco 2016 Annual Security Report, 42…
What’s in Your Incident Response Go-Bag?
October was National Cyber Security Awareness month and there’s been a lot of talk about how organizations should be doing more to protect their networks. One of the current trends in cyber security is that organizations are increasingly turning to trusted partners like Cisco for some or all of thei…
Is Your Race to SOC Headed for an Epic Crash?
Before You Take Off, Get Up To Speed on These Six Precursors to Incident Response It seems most advice on setting up a Security Operations Center (SOC), or creating a Computer Security Incident Response Team (CSIRT), focuses on people, technology or processes. Unfortunately, such advice may also in…
Combatting Cybercrime with an Incident Response Plan
Based on the cybersecurity news proliferating in the mainstream media today – from ransomware incidents to data breaches of massive proportions – it has become clear that organizations need to put security mechanisms in place to protect their IT infrastructure. Organizations commonly use anti-virus,…
Ransomware: The race you don’t want to lose
In the race to detect and contain ransomware on their networks, many organizations fail before they are out of the gate. The reason has very little to do with technology, and more so a great deal to do with process. “But we bought all the good tools!”, such organizations protest. Good security tech…
The Haves & Have Nots: Threat Management Maturity
IT departments regularly ask us questions about their security posture, their security concerns, and specifically, the makeup of their Threat Management (TM) organizations. Generally speaking, Threat Management includes anything in the Intel-Detection-Response arena, generally encompassing Security…
A “quick” guide to QUIC
Intelligence Gathering 101 Traffic analysis is rapidly becoming critical for threat analysis and incident response teams, and a choke point on their capability to be effective. Performing analysis on incoming threats requires security professionals to have monitoring tools that can give them an unde…
NetFlow AND PCAP (not or)
As digital transformation sweeps across the world, there is a driving need for more effective logging and data recording for incident response. In today’s IT world, your agency’s Computer Incident Response Team (CIRT) must have the capability to quickly determine the source and scope of an attack on…
1