Incident Response
Beyond Detection: Enhancing Your Security Posture with Predictive Cyberthreat Insights
The goal of cybersecurity is not just to respond to today’s threats but to anticipate tomorrow’s challenges. I recently had an enlightening conversation with Christopher Budd, Director of Sophos X-Ops Intelligence, to ...
How to Build a Phishing Playbook Part 3: Playbook Development
Welcome the third part of our series on how to build an automated incident response playbook for phishing threats inside of Smart SOAR. In this part, we will be transferring our rough ...
Getting Ahead of Cybersecurity Materiality Mayhem
Cybersecurity leaders must differentiate between strategic (material) and tactical threats in a cross-functional manner and determine 'materiality.' ...
Does Your Security Team Need a Dedicated Collaboration Tool?
Investing in an IT- and/or security-specific collaboration platform ensures your team has tools that align with their IT and security requirements ...
2023 Sees Record Data Compromises Amidst Changing Tactics
Cybercriminals are shifting their focus toward targeted identity fraud and scams resulting in fewer overall victims ...
How to Enrich Data for Fraud Reduction, Risk Management and Mitigation in BFSI
BFSI organizations are increasingly relying on data products to enrich data and enhance fraud reduction and risk management strategies ...
Two Practical Examples of Modern Cloud SecOps
These two examples of of core principles should help any SecOps team improve their cloud security operations. ...
The Evolving Threat Landscape: Where Out-of-Band Communications Fit – Part Two
It's important to establish and test out-of-band communication before you experience an attack, or 'left-of-bang.' ...
The Evolving Threat Landscape: Where Out-of-Band Communications Fit – Part One
Out-of-band communication is a necessity to prohibit outsiders from observing internal incident response activities or taunting response teams ...
Russian Hackers Orchestrate Ukrainian Telecom Giant Attack
In a recent revelation by Ukraine’s top cyber official, Illia Vitiuk, it has been unveiled that the cyberattack on Kyivstar, Ukraine’s largest telecom operator, had its roots embedded months before the notorious ...