• Cyber Security Incident Response

    Old

    Setting up an cyber security incident response system? Spend your money wisely and make sure you’re ready to invest a bit of time not only in the setup and preparation efforts but, also in maintenance and routine testing and training.

  • Cyber Incident Response: Detect – Respond – Contain

    Old

    In talking with a customer recently about Cyber Incident Response, he helped me realize that when dealing with the cleanup of cyber threats we need to follow a methodical protocol. His focus on Detect, Respond and Contain helped inspire me to write about the topic and how flow collection allowed him to reach his investigation […]

  • Cyber Threat Intelligence: 3 Pillars of Strength

    Old

    Targeted Cyber Threats are evading many of our best security defenses. We’ve put setup firewalls, enforced password rotation, installed an IDS, verified that antivirus is up to date and even educated employees on common sense practices when using the web.

  • Cloud Security Problems: What can be done?

    Old

    As companies leverage cloud services more in order to stay competitive in the market place, it is important to keep in mind that security against cyber threats is not entirely outsourced to the vendor offering the cloud service. From a monitoring and cyber threat detection perspective, it actually doesn’t change much especially if employees working […]

Back to Top