Intelligence, Modelling and Hunting Through an ATT&CKers Lens
Unless you’ve been asleep recently, you’ll probably be aware of MITRE’s ATT&CK framework. This is a game changer for defenders as it maps out the common threats that an enterprise will face. ATT&CK aligns this to protective and detective controls and allows everyone within the enterprise to speak a common language on how attackers might […]
World, Meet Cisco Secure
Cisco Secure offers business and security architecture collaboration, freeing your workforce to focus valuable time and energy on objectives that really matter. Empowering you to focus more on opportunities.
Practical Ways to Reduce Ransomware Impact: Actions You Can Take Today
During the past year, Cisco Security Incident Response Services has provided emergency incident response services for many customers dealing with incidents that sometimes become a ransomware event. In...
Increase Your Security Resiliency with Enhanced Incident Response Retainer Services
Introducing our Enhanced IR Retainer, which includes: 1) detection assessment and 2) adversary simulation purple team. Our detection assessment examines an organization’s resiliency to attacks, while simultaneously assessing the organization’s ability to detect the attacks.
Hello World! Contextual Identity Within the Spacetime Continuum
Hello world! I think that’s the obligatory first line for any technology blog, right? But, how do you know I am here? How do you know I exist? I have...
So You Want To Build A SOC: Security Intelligence and Technical Considerations (Part 2)
As security consultants, we go into an extraordinary array of organisations’ security environments, all with very differing levels of maturity. Our clients consistently state a common desire: "We need a...
So You Want to Build a SOC: Foundations for Your Security Operations Team (Part 1)
As security consultants, we go into an extraordinary array of organisations with very differing levels of maturity and one thing keeps on coming up: "we need a SOC". Whilst this...
Compromise Assessment vs Threat Hunting
While table top exercises are always a hot commodity for our customers, proactive threat hunting and compromise assessments are becoming increasingly popular through our Cisco Incident Response Readiness & Retainer service.