Security Services

May 13, 2019

SECURITY

Practical Ways to Reduce Ransomware Impact: Actions You Can Take Today

During the past year, Cisco Security Incident Response Services has provided emergency incident response services for many customers dealing with incidents that sometimes become a ransomware event. In many cases, we were engaged by the company at the first sign of trouble and were able to help conta…

April 23, 2019

SECURITY

Increase Your Security Resiliency with Enhanced Incident Response Retainer Services

It’s been a fun and exciting four years at Cisco building out our market-leading Incident Response service, and the one thing I continually focus on is not resting on our laurels. That’s why I’m really excited to announce that moving forward, we are  enhancing our Incident Response Retainer offering…

March 13, 2019

SECURITY

Hello World! Contextual Identity Within the Spacetime Continuum

Hello world! I think that’s the obligatory first line for any technology blog, right? But, how do you know I am here? How do you know I exist? I have a blog profile, I have a picture, I have a blog tagged to my name. All of these are contextual clues that I exist in reality, without actually being p…

February 12, 2019

SECURITY

So You Want To Build A SOC: Security Intelligence and Technical Considerations (Part 2)

As security consultants, we go into an extraordinary array of organisations’ security environments, all with very differing levels of maturity. Our clients consistently state a common desire:   “We need a SOC.” My last post on this topic focused on the operational considerations.  Now le…

February 5, 2019

SECURITY

So You Want to Build a SOC: Foundations for Your Security Operations Team (Part 1)

As security consultants, we go into an extraordinary array of organisations’ security environments, all with very differing levels of maturity. Our clients consistently state a common desire:   “We need a SOC.” Building a SOC doesn’t present a problem for Cisco’ Security Advi…

December 3, 2018

SECURITY

Compromise Assessment vs Threat Hunting

While table top exercises are always a hot commodity for our customers, proactive threat hunting and compromise assessments are becoming increasingly popular through our Cisco Incident Response Readiness & Retainer service. Whether your organization has recently gone through a merger or acquisit…

November 10, 2018

SECURITY

War Games: A WOPR of a Security Test (Part 4)

As any security consultant will know, the more fun you have on an engagement (see part 1, part 2 and part 3 for the back story), the longer the report will be afterwards and the more important the executive and technical summaries will be in tying all the observations together in an actionable fashi…

November 3, 2018

SECURITY

War Games: A WOPR of a Security Test (Part 3)

So how did the team get on in our War Game exercise?  In order to complete the War Game exercise (the setup for which can be found in part 1 and part 2 of this series), our Security Advisory Services team determined that the following attack scenarios would need to be simulated: The plan A broad ta…

November 2, 2018

SECURITY

The Role of a Coach

This time of year, all five major sports leagues are “in season”. The raw emotion of competition and witnessing these finely tuned professional athletes overcome adversity to be the best in their fields can be exhilarating. While these athletes are the most dominant in the world at their craft, they…