Articles
Threat Hunting: How to Gain the Most Value
4 min read
As security practitioners who continuously look for adversarial malice, one of the questions we are asked frequently is: What’s around the corner?
Increase Your Security Resiliency with Enhanced Incident Response Retainer Services
2 min read
Introducing our Enhanced IR Retainer, which includes: 1) detection assessment and 2) adversary simulation purple team. Our detection assessment examines an organization’s resiliency to attacks, while simultaneously assessing the organization’s ability to detect the attacks.
Cisco Recognized as a Leader in Incident Response
3 min read
It is never ideal to “go it alone” during a cybersecurity breach. Talk about a high-pressure situation. Getting access to experts is critical: with a strong support team, you’ll have...
Top 5 Recommendations from Cisco Incident Response Engagements
5 min read
In the course of an emergency response, our Incident Response (IR) team constantly makes tactical and strategic recommendations according to customer and environment needs. Here are the 5 top recommendations.
Incident Response Fundamentals – Communication
5 min read
While there are a number of ways to err during the course of responding to an incident, it never seems to fail that the number one misstep I...
Is it time to hire cybersecurity guardians for the network?
1 min read
Another day, another hack. It seems like every time we turn on the news, we are hearing about another company that has been breached. How to remove the burden of detection, investigation and remediation from the in-house security teams? What about recovering a network and rebuilding trust after a breach – when is the time to turn to an expert? Join #CiscoChat on Wed, June 7th at 11AM PST to talk about alleviating the stress of dealing with the advanced threat landscape.
Combatting Cybercrime with an Incident Response Plan
2 min read
Based on the cybersecurity news proliferating in the mainstream media today – from ransomware incidents to data breaches of massive proportions – it has become clear that organizations need to...
The Haves & Have Nots: Threat Management Maturity
2 min read
IT departments regularly ask us questions about their security posture, their security concerns, and specifically, the makeup of their Threat Management (TM) organizations. Generally speaking, Threat Management includes anything in the Intel-Detection-Response arena, generally encompassing Security Operations Centers, Intelligence Organizations, and Incident Response Teams. When it comes to the makeup of their TM organizations, companies […]
Incident Response Goes to Hollywood
2 min read
Having personally spent a lot of time at Fortune 500’s, I know that individuals tend to develop blinders when dedicated to an organization, and begin to accept that things are done a certain way, and there is an order about things. It may come as a surprise then, when others don’t do things the way […]