Security Services
Intelligence, Modelling and Hunting Through an ATT&CKers Lens
3 min read
Unless you’ve been asleep recently, you’ll probably be aware of MITRE’s ATT&CK framework. This is a game changer for defenders as it maps out the common threats that an enterprise will face. ATT&CK aligns this to protective and detective controls and allows everyone within the enterprise to speak a common language on how attackers might […]
World, Meet Cisco Secure
3 min read
Cisco Secure offers business and security architecture collaboration, freeing your workforce to focus valuable time and energy on objectives that really matter. Empowering you to focus more on opportunities.
Practical Ways to Reduce Ransomware Impact: Actions You Can Take Today
6 min read
During the past year, Cisco Security Incident Response Services has provided emergency incident response services for many customers dealing with incidents that sometimes become a ransomware event. In...
Increase Your Security Resiliency with Enhanced Incident Response Retainer Services
2 min read
Introducing our Enhanced IR Retainer, which includes: 1) detection assessment and 2) adversary simulation purple team. Our detection assessment examines an organization’s resiliency to attacks, while simultaneously assessing the organization’s ability to detect the attacks.
Hello World! Contextual Identity Within the Spacetime Continuum
3 min read
Hello world! I think that’s the obligatory first line for any technology blog, right? But, how do you know I am here? How do you know I exist? I have...
So You Want To Build A SOC: Security Intelligence and Technical Considerations (Part 2)
3 min read
As security consultants, we go into an extraordinary array of organisations’ security environments, all with very differing levels of maturity. Our clients consistently state a common desire: "We need a...
So You Want to Build a SOC: Foundations for Your Security Operations Team (Part 1)
3 min read
As security consultants, we go into an extraordinary array of organisations with very differing levels of maturity and one thing keeps on coming up: "we need a SOC". Whilst this...
Compromise Assessment vs Threat Hunting
5 min read
While table top exercises are always a hot commodity for our customers, proactive threat hunting and compromise assessments are becoming increasingly popular through our Cisco Incident Response Readiness & Retainer service.
War Games: A WOPR of a Security Test (Part 4)
2 min read
These blue team actions should be performed on top of any specific remedial actions that are carried out to resolve specific issues.