Security Advisory EMEAR
Intelligence, Modelling and Hunting Through an ATT&CKers Lens
3 min read
Unless you’ve been asleep recently, you’ll probably be aware of MITRE’s ATT&CK framework. This is a game changer for defenders as it maps out the common threats that an enterprise will face. ATT&CK aligns this to protective and detective controls and allows everyone within the enterprise to speak a common language on how attackers might […]
So You Want To Build A SOC: Security Intelligence and Technical Considerations (Part 2)
3 min read
As security consultants, we go into an extraordinary array of organisations’ security environments, all with very differing levels of maturity. Our clients consistently state a common desire: "We need a...
So You Want to Build a SOC: Foundations for Your Security Operations Team (Part 1)
3 min read
As security consultants, we go into an extraordinary array of organisations with very differing levels of maturity and one thing keeps on coming up: "we need a SOC". Whilst this...
War Games: A WOPR of a Security Test (Part 4)
2 min read
These blue team actions should be performed on top of any specific remedial actions that are carried out to resolve specific issues.
War Games: A WOPR of a Security Test (Part 3)
12 min read
The Team believes that the likelihood of a successful Internet delivered attack by either a malicious insider or via an external actor is high, given the systemic failures identified in these scenarios.
War Games: A WOPR of a Security Test (Part 2)
3 min read
Having defined the scenarios, you can see how these could be linked together in different ways to form comprehensive attack vectors.
War Games: A WOPR of a Security Test (Part 1)
3 min read
In what was an interesting change to the usual technical and risk/compliance focused consultancy, the Team carried out a War Games exercise - similar to a "Red Team" engagement.
Securing the Cloud: Assessing the Security of TLS
2 min read
Moving from self-hosted infrastructure to cloud-based environments increases the demand for resiliency and security. Cisco's cloud security solutions give our customers the visibility they desire.
The Importance of Logs
3 min read
It's funny how the world turns. I started off in security working for a bank. The model there was very much build it, break it, fix it with our Operational...