September 9, 2019
The incident response plan outlined at the bottom of this post is a snippet from a generic plan I found on Google. It is a plan created by Virginia Tech. In its entirety, it is 41 pages long. Try flipping through that when you are under attack! Can you guess how long each step below will take your IT group, without help? One can imagine that the times can vary widely depending […]
Filed Under:
Uncategorized
September 9, 2019
It surprises me how many tools companies use for cyber security are just logging tools. Sure, logging should be one part of your security posture, but it is unwise to rely on logging for the total solution. So, if logging from tools like Splunk, LogRhythm and AlienVault were valuable from a forensic standpoint, why is the logging that is collected so often inadmissible in court[…]
Filed Under:
Uncategorized
RECENT POSTS
- Top 5 Benefits of Conducting a Gap Analysis in Cyber Security
- 4 Ways Mobile Device Fleet Management Tools Streamline Modern Businesses
- How Outsourced Telecom Expense Management Can Help Your Business Grow
- 7 Benefits of AI in Cyber Security
- How Businesses Use AI To Improve Customer Experience
- 6 Reasons Why Businesses Should Consider the Cloud for Cyber Security
ARCHIVES
CATEGORIES