A tiered team structure is a common approach for organizing security operations centers (SOCs) as it allows for the efficient handling of incidents based on their severity and complexity. The tiers are usually defined as Level 1, Level 2, and Level 3, with each level having a specific set of roles and responsibilities. As we have at LMNTRIX, you may also create incident management queues to align to this tiered team structure.
A tiered team structure is a common approach for organizing security operations centers (SOCs) as it allows for the efficient handling of incidents based on their severity and complexity. The...
The LMNTRIX Mean Time to Remediation (MTTR) is a metric that measures the amount of time it takes for our SOC to detect and resolve a security incident or vulnerability. We find this to be one of...
Security operations centers (SOCs) are responsible for identifying, responding to, and mitigating cyber threats, and automation can be a powerful tool to help SOCs improve their efficiency and...
A new threat group emerged around late October, or early November 2021, dubbed Team TNT. The discovery of the threat group highlighted the problems traditional antivirus and EDR tools currently...
QR Codes – Quick Response Codes have gained a lot of popularity in the world, they were originally designed for the automotive industry by Toyota’s subsidiary - Densowave to track vehicle parts...
In 2022, the Black Hat security conference celebrated its 25th anniversary, and our team headed by Hamlet Khodaverdian, from California was in attendance at Blackhat USA 2022. Here's a much...
In the last article of this series we looked at how Iran’s state-sponsored hacking activities evolved into the destructive force, it is today. However, Iran is not the only nation-state force in...
New and emerging products are built around containers daily to transform how applications are developed and delivered using the DevSecOps methodology. Such a methodology is based on continuous...
Introduction Disclaimer: LMNTRIX neither supports nor condones illegal acts of hacking and/or cyber war-like campaigns in any form. As a cyber defense company, we refuse to take sides with Russia...
When we last looked at zero-day exploits we focused on memory control flaws and flaws found in ICS/SCADA systems. In part three we will look at two more commonly exploited types of zero-day...
Our security experts are standing by to help you with an incident or answer questions about our consulting and managed detection and response services.