Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

February 2023

Computer Security Incident Response Teams: CSIRT Models, Skills & Best Practices

If you are a fan of superhero movies like me, the assembling of the Avengers or Justice League at a pivotal moment to take on the villains is one exhilarating experience. That the collective strength, rather than individual brilliance, saves the day is a common them in most films of this genre. And the same can be applied to any organization that comes face to face with a major cybersecurity incident such as an enterprise-wide ransomware attack or a massive DDOS attack: the teams save the day.

Stories from the SOC - The case for human response actions

As we move towards more automation, we should remember the risk of over-automating, or at least make a conscious decision to accept the risks. This is especially important in automating response actions, which left unchecked could wreak havoc with day-to-day business operations.

LimaCharlie as a low-cost way to improve cyber resilience

Organizations know that they need to become more cyber resilient, and are asking MSSPs and enterprise security teams to help. But in a time of economic uncertainty and shrinking budgets, the goal of cyber resilience is often at odds with what management is prepared to invest. The good news is that LimaCharlie can be used to help security professionals improve cyber resilience—with a level of control and at a cost efficiency unparalleled industrywide.

The Masterclass Series - Career Development & Incident Response

Join cyber security veteran and Razorthorn MD James Rees on Friday 3rd Feb when we will be discussing: Career Path Management Choosing a discipline and a career path is an important part of your cyber security journey. Firstly today we discuss when to do it, how to choose, baseline and specialised certifications to consider, along with tips and tricks to ensuring you effectively manage your career path.

8 Steps Every Incident Response Plan Requires to Spot, Contain and Recover From an Attack

The popular saying “Keep Calm and Carry On” is a good mantra for any company that finds itself undergoing cyberattack, but what that pithy phrase does not mention is how one stays calm when a threat actor has locked down your system and is demanding a multimillion-dollar ransom?