Security Information and Event Management Series Part 2: Types of SIEM solutionsIn the first part of this four-part series, we covered the need for Security Information and Event Management (SIEM) solutions... BLOG What Is Cyber Kill Chain Process? October 23, 2020 Cyber Kill Chain is a concept branded by Lockheed Martin, that describes how the attacker proceeds with his steps during... “The Question Is Not IF, But WHEN!” – Interview With Ondrej Krehel, LIFARS’ CEO And Founder: Part 2 October 22, 2020 Ondrej Krehel, CEO & Founder of LIFARS is recognized world-wide for his Digital Forensic expertise and Ethical Hacking. He actively... Security Information and Event Management Series Part 1: Introduction To SIEM October 19, 2020 Cyber-attacks are consistently increasing, and as a result, so is the resulting damage. While attackers can target any organization as... Top tactics used in critical attacks against corporate endpoints October 16, 2020 Companies have suffered under a growing barrage of high-profile cyberattacks over the last decade. If it’s not enough that cyber... “Security Controls Should Harmonize Like Orchestra” – Interview With Ondrej Krehel, LIFARS’ CEO And Founder: Part 1 October 15, 2020 Ondrej Krehel, CEO & Founder of LIFARS is recognized world-wide for his Digital Forensic expertise and Ethical Hacking. He actively... What is the SIM3 Model? October 9, 2020 An organization’s incident response process must aim for continual improvement. It cannot achieve perfectness in its incident response right from... What to Include in the Incident Response Form? October 8, 2020 The definition of a “security incident” can include any incident that violates an organization’s security policies or harms its security... What is incident response readiness assessment? September 22, 2020 During an ongoing cyberattack, time is of critical essence. Your incident response team must know what it needs to do.... Incident Response: Jumpbag September 15, 2020 When incident happens, the time required to respond should be as low as possible. Every minute wasted can mean another... DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying... Dangerous Internet’s Cat Meow September 1, 2020 The ‘Meow’ is one of the first publicly known cyberattacks to steal and wipe out insecure data. This attack... Backup Policy vs Backup Plan vs Backup Procedure August 27, 2020 Modern-day enterprises implement a flurry of security measures to protect their IT infrastructure from ever-evolving threats. These security measures... International forums and organizations for CSIRT/CERT teams August 26, 2020 As threats continue to grow in our cyberspace, setting up a dedicated team for incident response has become an undeniable... Advantages of Cyber Incident Retainers August 25, 2020 Being on constant alert for cyber threats to your organization is a must. A cyber-attack can strike your organization at...
Security Information and Event Management Series Part 2: Types of SIEM solutionsIn the first part of this four-part series, we covered the need for Security Information and Event Management (SIEM) solutions...
BLOG What Is Cyber Kill Chain Process? October 23, 2020 Cyber Kill Chain is a concept branded by Lockheed Martin, that describes how the attacker proceeds with his steps during... “The Question Is Not IF, But WHEN!” – Interview With Ondrej Krehel, LIFARS’ CEO And Founder: Part 2 October 22, 2020 Ondrej Krehel, CEO & Founder of LIFARS is recognized world-wide for his Digital Forensic expertise and Ethical Hacking. He actively... Security Information and Event Management Series Part 1: Introduction To SIEM October 19, 2020 Cyber-attacks are consistently increasing, and as a result, so is the resulting damage. While attackers can target any organization as... Top tactics used in critical attacks against corporate endpoints October 16, 2020 Companies have suffered under a growing barrage of high-profile cyberattacks over the last decade. If it’s not enough that cyber... “Security Controls Should Harmonize Like Orchestra” – Interview With Ondrej Krehel, LIFARS’ CEO And Founder: Part 1 October 15, 2020 Ondrej Krehel, CEO & Founder of LIFARS is recognized world-wide for his Digital Forensic expertise and Ethical Hacking. He actively... What is the SIM3 Model? October 9, 2020 An organization’s incident response process must aim for continual improvement. It cannot achieve perfectness in its incident response right from... What to Include in the Incident Response Form? October 8, 2020 The definition of a “security incident” can include any incident that violates an organization’s security policies or harms its security... What is incident response readiness assessment? September 22, 2020 During an ongoing cyberattack, time is of critical essence. Your incident response team must know what it needs to do.... Incident Response: Jumpbag September 15, 2020 When incident happens, the time required to respond should be as low as possible. Every minute wasted can mean another... DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying... Dangerous Internet’s Cat Meow September 1, 2020 The ‘Meow’ is one of the first publicly known cyberattacks to steal and wipe out insecure data. This attack... Backup Policy vs Backup Plan vs Backup Procedure August 27, 2020 Modern-day enterprises implement a flurry of security measures to protect their IT infrastructure from ever-evolving threats. These security measures... International forums and organizations for CSIRT/CERT teams August 26, 2020 As threats continue to grow in our cyberspace, setting up a dedicated team for incident response has become an undeniable... Advantages of Cyber Incident Retainers August 25, 2020 Being on constant alert for cyber threats to your organization is a must. A cyber-attack can strike your organization at...
What Is Cyber Kill Chain Process? October 23, 2020 Cyber Kill Chain is a concept branded by Lockheed Martin, that describes how the attacker proceeds with his steps during...
“The Question Is Not IF, But WHEN!” – Interview With Ondrej Krehel, LIFARS’ CEO And Founder: Part 2 October 22, 2020 Ondrej Krehel, CEO & Founder of LIFARS is recognized world-wide for his Digital Forensic expertise and Ethical Hacking. He actively...
Security Information and Event Management Series Part 1: Introduction To SIEM October 19, 2020 Cyber-attacks are consistently increasing, and as a result, so is the resulting damage. While attackers can target any organization as...
Top tactics used in critical attacks against corporate endpoints October 16, 2020 Companies have suffered under a growing barrage of high-profile cyberattacks over the last decade. If it’s not enough that cyber...
“Security Controls Should Harmonize Like Orchestra” – Interview With Ondrej Krehel, LIFARS’ CEO And Founder: Part 1 October 15, 2020 Ondrej Krehel, CEO & Founder of LIFARS is recognized world-wide for his Digital Forensic expertise and Ethical Hacking. He actively...
What is the SIM3 Model? October 9, 2020 An organization’s incident response process must aim for continual improvement. It cannot achieve perfectness in its incident response right from...
What to Include in the Incident Response Form? October 8, 2020 The definition of a “security incident” can include any incident that violates an organization’s security policies or harms its security...
What is incident response readiness assessment? September 22, 2020 During an ongoing cyberattack, time is of critical essence. Your incident response team must know what it needs to do....
Incident Response: Jumpbag September 15, 2020 When incident happens, the time required to respond should be as low as possible. Every minute wasted can mean another...
DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying...
Dangerous Internet’s Cat Meow September 1, 2020 The ‘Meow’ is one of the first publicly known cyberattacks to steal and wipe out insecure data. This attack...
Backup Policy vs Backup Plan vs Backup Procedure August 27, 2020 Modern-day enterprises implement a flurry of security measures to protect their IT infrastructure from ever-evolving threats. These security measures...
International forums and organizations for CSIRT/CERT teams August 26, 2020 As threats continue to grow in our cyberspace, setting up a dedicated team for incident response has become an undeniable...
Advantages of Cyber Incident Retainers August 25, 2020 Being on constant alert for cyber threats to your organization is a must. A cyber-attack can strike your organization at...