How Incident Response Retainer Brings Value to BusinessesOne consequence of a security breach is the leakage of classified information and the disruption of business activities. Significantly, a... BLOG Compensatory Security Controls: The Alternative Solution December 18, 2020 In the modern-day threat landscape, organizations cannot sit back and wait for an attack to happen. They need to implement... Detective Security Controls December 4, 2020 Organizations implement technical, administrative, and physical controls to maintain an adequate level of security posture. The nature of these controls... Corrective Security Controls November 30, 2020 Organizations implement a comprehensive set of security controls to minimize their risks. For security professionals, it is necessary to understand... Security Information and Event Management Series Part 4: Selecting a SIEM vendor November 9, 2020 In this last part of our series on SIEM, we will try to provide recommendations on selecting a SIEM vendor.... Security Information and Event Management Series Part 3: Main capabilities of SIEM November 2, 2020 In the first part of this four-part series, we covered the need for SIEM solutions and explained the fundamentals. Then,... Security Information and Event Management Series Part 2: Types of SIEM solutions October 26, 2020 In the first part of this four-part series, we covered the need for Security Information and Event Management (SIEM) solutions... Security Information and Event Management Series Part 1: Introduction To SIEM October 19, 2020 Cyber-attacks are consistently increasing, and as a result, so is the resulting damage. While attackers can target any organization as... DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying... Ransomware Struck: Now What? December 30, 2019 Note: our stance is the same as the FBI’s and we advise against paying a ransom as there is no...
How Incident Response Retainer Brings Value to BusinessesOne consequence of a security breach is the leakage of classified information and the disruption of business activities. Significantly, a...
BLOG Compensatory Security Controls: The Alternative Solution December 18, 2020 In the modern-day threat landscape, organizations cannot sit back and wait for an attack to happen. They need to implement... Detective Security Controls December 4, 2020 Organizations implement technical, administrative, and physical controls to maintain an adequate level of security posture. The nature of these controls... Corrective Security Controls November 30, 2020 Organizations implement a comprehensive set of security controls to minimize their risks. For security professionals, it is necessary to understand... Security Information and Event Management Series Part 4: Selecting a SIEM vendor November 9, 2020 In this last part of our series on SIEM, we will try to provide recommendations on selecting a SIEM vendor.... Security Information and Event Management Series Part 3: Main capabilities of SIEM November 2, 2020 In the first part of this four-part series, we covered the need for SIEM solutions and explained the fundamentals. Then,... Security Information and Event Management Series Part 2: Types of SIEM solutions October 26, 2020 In the first part of this four-part series, we covered the need for Security Information and Event Management (SIEM) solutions... Security Information and Event Management Series Part 1: Introduction To SIEM October 19, 2020 Cyber-attacks are consistently increasing, and as a result, so is the resulting damage. While attackers can target any organization as... DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying... Ransomware Struck: Now What? December 30, 2019 Note: our stance is the same as the FBI’s and we advise against paying a ransom as there is no...
Compensatory Security Controls: The Alternative Solution December 18, 2020 In the modern-day threat landscape, organizations cannot sit back and wait for an attack to happen. They need to implement...
Detective Security Controls December 4, 2020 Organizations implement technical, administrative, and physical controls to maintain an adequate level of security posture. The nature of these controls...
Corrective Security Controls November 30, 2020 Organizations implement a comprehensive set of security controls to minimize their risks. For security professionals, it is necessary to understand...
Security Information and Event Management Series Part 4: Selecting a SIEM vendor November 9, 2020 In this last part of our series on SIEM, we will try to provide recommendations on selecting a SIEM vendor....
Security Information and Event Management Series Part 3: Main capabilities of SIEM November 2, 2020 In the first part of this four-part series, we covered the need for SIEM solutions and explained the fundamentals. Then,...
Security Information and Event Management Series Part 2: Types of SIEM solutions October 26, 2020 In the first part of this four-part series, we covered the need for Security Information and Event Management (SIEM) solutions...
Security Information and Event Management Series Part 1: Introduction To SIEM October 19, 2020 Cyber-attacks are consistently increasing, and as a result, so is the resulting damage. While attackers can target any organization as...
DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying...
Ransomware Struck: Now What? December 30, 2019 Note: our stance is the same as the FBI’s and we advise against paying a ransom as there is no...