Applying MITRE ATT&CK and Shield Frameworks in the Real-WorldThe threat landscape has never been as diverse, and the bad news is that it’s continuously expanding and evolving. SecOps... BLOG What Is MTTD And MTTR And How To Improve It? December 2, 2020 The global cyber threat landscape facing businesses is becoming more daunting every year. SecOps professionals are increasingly turning to information-based... Maze Ransomware: An Infamous Cybercriminal Group Announces to Shut Down its Operations December 1, 2020 In a press release, a notorious cybercriminal group named Maze proclaims to shut down its operations. Ever since the announcement... What Are The Most Common Myths About ISO 27001? November 27, 2020 ISO 27001:2013 is a class apart when it comes to well-known regulations or standards related to information security. Companies are... FBI: Cyber Threat Actors Stole Source Code From US Government Agencies And Private Companies November 25, 2020 The FBI (Federal Bureau of Investigation) has sent out a security warning on October 14, 2020, regarding insecure SonarQube instances.... What Should An Incident Response Plan Contain? November 24, 2020 The threat landscape businesses are facing worldwide has never been as diverse or as harmful. An organization-wide incident response plan... Types of SSL Certificates – Why Should You Care? November 20, 2020 Are you in a process of creating your own webpage or do you already have one or two? Then, you... Common Mistakes That CISOs Do And How To Avoid Them November 17, 2020 News about data breaches continue to come up, and their pace is only getting faster. It is only becoming easier... What Is The Average Time To Detect Data Breaches And How To Reduce It? November 3, 2020 On this information superhighway we’re on, data has become one of the most sought after and valuable assets. Whether it’s... What Is Cyber Kill Chain Process? October 23, 2020 Cyber Kill Chain is a concept branded by Lockheed Martin, that describes how the attacker proceeds with his steps during... Top tactics used in critical attacks against corporate endpoints October 16, 2020 Companies have suffered under a growing barrage of high-profile cyberattacks over the last decade. If it’s not enough that cyber... What is the SIM3 Model? October 9, 2020 An organization’s incident response process must aim for continual improvement. It cannot achieve perfectness in its incident response right from... What to Include in the Incident Response Form? October 8, 2020 The definition of a “security incident” can include any incident that violates an organization’s security policies or harms its security... Zero-day and N-Day Exploits September 24, 2020 Computer exploit is a software that abuses a security vulnerability. It is written by threat actors to help achieve their goals,... What is incident response readiness assessment? September 22, 2020 During an ongoing cyberattack, time is of critical essence. Your incident response team must know what it needs to do....
Applying MITRE ATT&CK and Shield Frameworks in the Real-WorldThe threat landscape has never been as diverse, and the bad news is that it’s continuously expanding and evolving. SecOps...
BLOG What Is MTTD And MTTR And How To Improve It? December 2, 2020 The global cyber threat landscape facing businesses is becoming more daunting every year. SecOps professionals are increasingly turning to information-based... Maze Ransomware: An Infamous Cybercriminal Group Announces to Shut Down its Operations December 1, 2020 In a press release, a notorious cybercriminal group named Maze proclaims to shut down its operations. Ever since the announcement... What Are The Most Common Myths About ISO 27001? November 27, 2020 ISO 27001:2013 is a class apart when it comes to well-known regulations or standards related to information security. Companies are... FBI: Cyber Threat Actors Stole Source Code From US Government Agencies And Private Companies November 25, 2020 The FBI (Federal Bureau of Investigation) has sent out a security warning on October 14, 2020, regarding insecure SonarQube instances.... What Should An Incident Response Plan Contain? November 24, 2020 The threat landscape businesses are facing worldwide has never been as diverse or as harmful. An organization-wide incident response plan... Types of SSL Certificates – Why Should You Care? November 20, 2020 Are you in a process of creating your own webpage or do you already have one or two? Then, you... Common Mistakes That CISOs Do And How To Avoid Them November 17, 2020 News about data breaches continue to come up, and their pace is only getting faster. It is only becoming easier... What Is The Average Time To Detect Data Breaches And How To Reduce It? November 3, 2020 On this information superhighway we’re on, data has become one of the most sought after and valuable assets. Whether it’s... What Is Cyber Kill Chain Process? October 23, 2020 Cyber Kill Chain is a concept branded by Lockheed Martin, that describes how the attacker proceeds with his steps during... Top tactics used in critical attacks against corporate endpoints October 16, 2020 Companies have suffered under a growing barrage of high-profile cyberattacks over the last decade. If it’s not enough that cyber... What is the SIM3 Model? October 9, 2020 An organization’s incident response process must aim for continual improvement. It cannot achieve perfectness in its incident response right from... What to Include in the Incident Response Form? October 8, 2020 The definition of a “security incident” can include any incident that violates an organization’s security policies or harms its security... Zero-day and N-Day Exploits September 24, 2020 Computer exploit is a software that abuses a security vulnerability. It is written by threat actors to help achieve their goals,... What is incident response readiness assessment? September 22, 2020 During an ongoing cyberattack, time is of critical essence. Your incident response team must know what it needs to do....
What Is MTTD And MTTR And How To Improve It? December 2, 2020 The global cyber threat landscape facing businesses is becoming more daunting every year. SecOps professionals are increasingly turning to information-based...
Maze Ransomware: An Infamous Cybercriminal Group Announces to Shut Down its Operations December 1, 2020 In a press release, a notorious cybercriminal group named Maze proclaims to shut down its operations. Ever since the announcement...
What Are The Most Common Myths About ISO 27001? November 27, 2020 ISO 27001:2013 is a class apart when it comes to well-known regulations or standards related to information security. Companies are...
FBI: Cyber Threat Actors Stole Source Code From US Government Agencies And Private Companies November 25, 2020 The FBI (Federal Bureau of Investigation) has sent out a security warning on October 14, 2020, regarding insecure SonarQube instances....
What Should An Incident Response Plan Contain? November 24, 2020 The threat landscape businesses are facing worldwide has never been as diverse or as harmful. An organization-wide incident response plan...
Types of SSL Certificates – Why Should You Care? November 20, 2020 Are you in a process of creating your own webpage or do you already have one or two? Then, you...
Common Mistakes That CISOs Do And How To Avoid Them November 17, 2020 News about data breaches continue to come up, and their pace is only getting faster. It is only becoming easier...
What Is The Average Time To Detect Data Breaches And How To Reduce It? November 3, 2020 On this information superhighway we’re on, data has become one of the most sought after and valuable assets. Whether it’s...
What Is Cyber Kill Chain Process? October 23, 2020 Cyber Kill Chain is a concept branded by Lockheed Martin, that describes how the attacker proceeds with his steps during...
Top tactics used in critical attacks against corporate endpoints October 16, 2020 Companies have suffered under a growing barrage of high-profile cyberattacks over the last decade. If it’s not enough that cyber...
What is the SIM3 Model? October 9, 2020 An organization’s incident response process must aim for continual improvement. It cannot achieve perfectness in its incident response right from...
What to Include in the Incident Response Form? October 8, 2020 The definition of a “security incident” can include any incident that violates an organization’s security policies or harms its security...
Zero-day and N-Day Exploits September 24, 2020 Computer exploit is a software that abuses a security vulnerability. It is written by threat actors to help achieve their goals,...
What is incident response readiness assessment? September 22, 2020 During an ongoing cyberattack, time is of critical essence. Your incident response team must know what it needs to do....