So You Want To Build A SOC: Security Intelligence and Technical Considerations (Part 2)
As security consultants, we go into an extraordinary array of organisations’ security environments, all with very differing levels of maturity. Our clients consistently state a common desire: "We need a...
So You Want to Build a SOC: Foundations for Your Security Operations Team (Part 1)
As security consultants, we go into an extraordinary array of organisations with very differing levels of maturity and one thing keeps on coming up: "we need a SOC". Whilst this...
War Games: A WOPR of a Security Test (Part 3)
The Team believes that the likelihood of a successful Internet delivered attack by either a malicious insider or via an external actor is high, given the systemic failures identified in these scenarios.
War Games: A WOPR of a Security Test (Part 2)
Having defined the scenarios, you can see how these could be linked together in different ways to form comprehensive attack vectors.
Securing the Cloud: Assessing the Security of TLS
Moving from self-hosted infrastructure to cloud-based environments increases the demand for resiliency and security. Cisco's cloud security solutions give our customers the visibility they desire.