Articles
Cisco Launches Global Threat Modeling Security Assessment Service for Threat-Informed Defense
3 min read
In today’s threat landscape, resilience depends on understanding how your adversaries operate as well as understanding your own environment. Learn about Cisco Threat Modeling today.
Intelligence, Modelling and Hunting Through an ATT&CKers Lens
3 min read
Unless you’ve been asleep recently, you’ll probably be aware of MITRE’s ATT&CK framework. This is a game changer for defenders as it maps out the common threats that an enterprise will face. ATT&CK aligns this to protective and detective controls and allows everyone within the enterprise to speak a common language on how attackers might […]
So You Want To Build A SOC: Security Intelligence and Technical Considerations (Part 2)
3 min read
As security consultants, we go into an extraordinary array of organisations’ security environments, all with very differing levels of maturity. Our clients consistently state a common desire: "We need a...
So You Want to Build a SOC: Foundations for Your Security Operations Team (Part 1)
3 min read
As security consultants, we go into an extraordinary array of organisations with very differing levels of maturity and one thing keeps on coming up: "we need a SOC". Whilst this...
War Games: A WOPR of a Security Test (Part 4)
2 min read
These blue team actions should be performed on top of any specific remedial actions that are carried out to resolve specific issues.
War Games: A WOPR of a Security Test (Part 3)
12 min read
The Team believes that the likelihood of a successful Internet delivered attack by either a malicious insider or via an external actor is high, given the systemic failures identified in these scenarios.
Securing the Cloud: Assessing the Security of TLS
2 min read
Moving from self-hosted infrastructure to cloud-based environments increases the demand for resiliency and security. Cisco's cloud security solutions give our customers the visibility they desire.
War Games: A WOPR of a Security Test (Part 2)
3 min read
Having defined the scenarios, you can see how these could be linked together in different ways to form comprehensive attack vectors.
War Games: A WOPR of a Security Test (Part 1)
3 min read
In what was an interesting change to the usual technical and risk/compliance focused consultancy, the Team carried out a War Games exercise - similar to a "Red Team" engagement.
- 1
- 2