Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

August 2022

Network Forensics & Incident Response with Open Source Tools

Open source security technologies such as Zeek, Suricata, and Elastic can deliver powerful network detection and response capabilities, and the global communities behind these tools can also serve as a force multiplier for security teams, such as accelerating their response times to zero-day exploits via community-driven detection engineering and intel sharing. This presentation will review popular open source technologies used in network DFIR and cover use cases, integrations, and open source design patterns.

Incident Response: Having a Plan in Place For Your Business

A cyber attack can happen to businesses of any size or structure. In order to protect your data and your systems, it is important to have a plan in place. This means having protocols in place for dealing with a cyber threat, and making sure all of your employees are aware of the plan and know what to do if an attack occurs. In this blog post, we will discuss the importance of incident response planning and how you can secure a structure that is right for your business.

Automated incident response using Log360

Security teams are often overwhelmed with alerts daily, including false positives, and actions that require attention but might be placed on the back burner. But when alerts start stacking up and aren’t addressed promptly, important security concerns might go unnoticed and these can spiral into a data breach. The time to detect and respond to security incidents should be as short as possible to limit the time an attacker can carry out an attack.

8 Essential Elements for an Incident Response Plan

In the first blog of our two-part incident response series, we explained how your organization can jump-start its incident response. In this second part, we’ll focus on the essential elements of an incident response plan—a critical factor for any company trying to recover from an incident quickly and confidently.