The Importance of Logs
It's funny how the world turns. I started off in security working for a bank. The model there was very much build it, break it, fix it with our Operational...
Top 5 Recommendations from Cisco Incident Response Engagements
In the course of an emergency response, our Incident Response (IR) team constantly makes tactical and strategic recommendations according to customer and environment needs. Here are the 5 top recommendations.
Incident Response and General Data Protection Regulation
This article will address provisions of the GDPR related to Incident Response (IR) planning. A proven IR plan will lend GDPR compliance and provide a framework for practical Incident Response.
The Power of Logging in Incident Response
A deep dive into logging as an often-overlooked but powerful tool for incident detection and response “Lack of instrumentation or insufficient logging” is often a phrase used on incident response...
Incident Response: Are you ready?
We created a short eBook to help security professionals deal with“what if” scenarios by building and strengthening incident response plans, thereby identifying what to do when things go wrong.
Dissecting a Breach: The Process of Incident Response
On December 5, 2017, at 1 pm Eastern, Cisco Security Incident Response Service experts will present a webinar titled “Dissecting a Breach: An Incident Responder’s Perspective.” This webinar will describe how our team performs incident handling within the service and what you should expect during any incident engagement, regardless of who is doing the work. We […]
Prevention or Cure? Focusing your Cybersecurity Efforts and Investments
An ounce of prevention is worth a pound of cure, so the saying goes. When it comes to protecting your organization against a cyber attack, it’s essential to factor in both.
Incident Response Fundamentals – Communication
While there are a number of ways to err during the course of responding to an incident, it never seems to fail that the number one misstep I...
Take incident response to the next level with AMP for Endpoints and Cognitive Threat Analytics
Our data shows that there are 5 to 10 breaches per 1000 seats every week. That number is staggering and exemplifies the limits of traditional prevention. Most of these attacks...