Tag: Cyber Response

October 17, 2022

What is Managed SOC (Security Operation Center)? Why MSPs need MDR

David Weiss

Managed SOC provides the highest level of threat protection to MSPs and their clients. It combines technology solutions with expert human teams for advanced threat hunting, monitoring and incident response.

Read Now
March 02, 2022

The Role of Compromise Assessments in Enterprise Security

Elizabeth Fichtner

A compromise or threat assessment differs from intrusion detection in that it is an independent, evidence based assessment reporting your vulnerabilities, suspicious behaviors, possible exploits and indicators of a successful compromise.

Read Now
February 17, 2022

A Practical Guide to Building a Cyber Incident Response Team

Elizabeth Fichtner

An effective CIRST can help respond quickly to security incidents, mitigating the damage caused to the organization.

Read Now
February 15, 2022

Cyber Security Compromise Assessments vs Vulnerability Assessments

Elizabeth Fichtner

Cyber Security Compromise (Risk) Assessments vs. Vulnerability Assessments: Which Should You Choose First?

Read Now
February 14, 2022

IR Planning: The Critical 6 Steps of Cyber Security Incident Response

Elizabeth Fichtner

An updated and well-practiced incident response plan is crucial in combatting cyber attackers.

Read Now
February 11, 2022

Incident Response Planning: A Checklist for Building Your Cyber Security Incident Response Plan

Elizabeth Fichtner

Is your organization prepared to respond to a security breach or cyber attack? According to many security experts, it’s a matter of “when” and not “if” your company will experience a serious cybersecurity incident.

Read Now
February 08, 2022

Best Practices for Preventing, Detecting, and Responding to Cyber Attacks

Elizabeth Fichtner

Preventing cyber attacks is a top security concern for most organizations in 2021, and with good reason.

Read Now
October 22, 2021

Atomic Red Team Part 2: Using Atomic Red Team for Adversary Attack Emulation

Cristofer Sochacki

In this blog, we will continue to outline what we discussed in Part 1 of this series and what we demonstrated in our session at DattoCon last week. We will be diving into the technical aspects of the tools used and how they were configured.

Read Now
October 18, 2021

Atomic Red Team Part 1: Testing Security Controls Through Attack Emulation

Cristofer Sochacki

Your team has deployed next-gen anti-virus, applied the latest security patches, and your are forwarding all endpoint telemetry to a managed detection and response vendor. The question you have now is – how can you ensure that the deployed defenses are working properly and you will be notified of malicious activity?

Read Now