SOC Operating Model
Choosing the appropriate operating model is a strategic decision that requires careful consideration of various factors. These include the purpose behind implementing a Security Operations Center...
While it can be argued that cybersecurity is everyone’s responsibility, some are better placed to deal with threats. Having the knowledge and ability to deal with ransomware, and ultimately prevent infection, is a strong case for partnering with a specialised managed detection & response provider. Been hacked twice in the space of a few months […]
Choosing the appropriate operating model is a strategic decision that requires careful consideration of various factors. These include the purpose behind implementing a Security Operations Center...
This is the sixth and final article in a series starting with "Critical Capabilities of a Modern SOC". In the last article, I talked about the "security investigation" capability, and in this...
In the last article we looked exclusively at Linux malware myths. In this part, both MacOS and Windows turn for a myth-busting session. First, we’ll take a look at the stubborn myths that still...
This is the fifth article in a series starting with "Critical Capabilities of a Modern SOC". In the last article, I talked about the "monitoring" capability, and in this article, I talk about the...
Threat actors can be some of the best recyclers on the planet. Unfortunately, it is not waste they recycle but previous tactics to compromise IT infrastructure. In recent months there has been a...
This is the fourth article in a series starting with the critical capabilities of a modern SOC. In the last article, I talked about the "detection" capability, and in this article, I talk about...
Humans love to place themselves in certain tech tribes. Whether it is programming languages, console versus PC gaming, and operating systems themselves, we place ourselves in one camp or the...
This is the third article in a series starting with the critical capabilities of a modern SOC. In the last article, I covered the "data collection and correlation" capability, and in this...
This is a follow-up to the article I wrote last week about the critical capabilities of a modern SOC. In this article, I cover the first capability discussed, namely, "data collection and...
The concept of a SOC has evolved over recent years to mean different things to different people, and in this article, I will try and bring some clarity for enterprises that are looking to build a...