Security Advisory EMEAR

August 12, 2020

SECURITY

Intelligence, Modelling and Hunting Through an ATT&CKers Lens

3 min read

Unless you’ve been asleep recently, you’ll probably be aware of MITRE’s ATT&CK framework. This is a game changer for defenders as it maps out the common threats that an enterprise will face. ATT&CK aligns this to protective and detective controls and allows everyone within the enterprise to speak a common language on how attackers might […]

February 12, 2019

SECURITY

So You Want To Build A SOC: Security Intelligence and Technical Considerations (Part 2)

3 min read

As security consultants, we go into an extraordinary array of organisations’ security environments, all with very differing levels of maturity. Our clients consistently state a common desire:   "We need a...

February 5, 2019

SECURITY

So You Want to Build a SOC: Foundations for Your Security Operations Team (Part 1)

3 min read

As security consultants, we go into an extraordinary array of organisations with very differing levels of maturity and one thing keeps on coming up: "we need a SOC". Whilst this...

November 10, 2018

SECURITY

War Games: A WOPR of a Security Test (Part 4)

2 min read

These blue team actions should be performed on top of any specific remedial actions that are carried out to resolve specific issues.

November 3, 2018

SECURITY

War Games: A WOPR of a Security Test (Part 3)

12 min read

The Team believes that the likelihood of a successful Internet delivered attack by either a malicious insider or via an external actor is high, given the systemic failures identified in these scenarios.

October 27, 2018

SECURITY

War Games: A WOPR of a Security Test (Part 2)

3 min read

Having defined the scenarios, you can see how these could be linked together in different ways to form comprehensive attack vectors.

October 20, 2018

SECURITY

War Games: A WOPR of a Security Test (Part 1)

3 min read

In what was an interesting change to the usual technical and risk/compliance focused consultancy, the Team carried out a War Games exercise - similar to a "Red Team" engagement.

August 22, 2018

SECURITY

Securing the Cloud: Assessing the Security of TLS

2 min read

Moving from self-hosted infrastructure to cloud-based environments increases the demand for resiliency and security. Cisco's cloud security solutions give our customers the visibility they desire.

June 6, 2018

SECURITY

The Importance of Logs

3 min read

It's funny how the world turns. I started off in security working for a bank. The model there was very much build it, break it, fix it with our Operational...