How the IBM X-Force IRIS Cyberattack Framework Helps Security Teams Reduce Risk at All Levels, Part 1

The IBM X-Force IRIS cyberattack preparation and execution frameworks aim to help security teams predict threat actors’ motives and tactics and communicate security intelligence more clearly.

The post How the IBM X-Force IRIS Cyberattack Framework Helps Security Teams Reduce Risk at All Levels, Part 1 appeared first on Security Intelligence.

Continue reading How the IBM X-Force IRIS Cyberattack Framework Helps Security Teams Reduce Risk at All Levels, Part 1

How to Develop An Incident Response Checklist for Your SaaS Business

Earlier this week, we published a post that explains how to develop an Incident Response Plan (IRP) to prepare for when an incident inevitably impacts your SaaS business. In addition to having an Incident Response Plan that identifies your critical sys… Continue reading How to Develop An Incident Response Checklist for Your SaaS Business

[SANS ISC] Converting PCAP Web Traffic to Apache Log

I published the following diary on isc.sans.org: “Converting PCAP Web Traffic to Apache Log“: PCAP data can be really useful when you must investigate an incident but when the amount of PCAP files to analyse is counted in gigabytes, it may quickly become tricky to handle. Often, the first protocol

[The post [SANS ISC] Converting PCAP Web Traffic to Apache Log has been first published on /dev/random]

Continue reading [SANS ISC] Converting PCAP Web Traffic to Apache Log

The Hack React: Testing a SOC Director’s Cybersecurity Incident Response

When Lincoln Healthcare experiences a watering hole attack, security operations center (SOC) director Malcolm Gerhard is tasked with developing a swift cybersecurity incident response. Will he succeed?

The post The Hack React: Testing a SOC Director’s Cybersecurity Incident Response appeared first on Security Intelligence.

Continue reading The Hack React: Testing a SOC Director’s Cybersecurity Incident Response

The Digital Disaster: A CIO Embraces Cyber Resilience

What happens when a malware infection results in permanent loss of data, operational downtime and significant reputational damage? Experience the cyber resilience failures of airline CIO Martin Kinsley.

The post The Digital Disaster: A CIO Embraces Cyber Resilience appeared first on Security Intelligence.

Continue reading The Digital Disaster: A CIO Embraces Cyber Resilience

Best Practices for Designing a Security Operations Center

Designing a security operations center (SOC) is not as simple as setting and forgetting an SIEM solution. Security leaders must consider human factors, business needs, budgetary constraints and more.

The post Best Practices for Designing a Security Operations Center appeared first on Security Intelligence.

Continue reading Best Practices for Designing a Security Operations Center

What Matters Most During a Data Breach? How You React

With the GDPR coming into effect on May 25, the cost of a data breach is about to skyrocket. A comprehensive, regularly updated CSIRP can help IR teams contain the damage associated with a breach.

The post What Matters Most During a Data Breach? How You React appeared first on Security Intelligence.

Continue reading What Matters Most During a Data Breach? How You React

A Whole New Ballgame: Applying the Immune System Approach to Sporting Event Cybersecurity

Emerging mobile and cloud-based technologies present many new challenges pertaining to sporting event cybersecurity.

The post A Whole New Ballgame: Applying the Immune System Approach to Sporting Event Cybersecurity appeared first on Security Intelligence.

Continue reading A Whole New Ballgame: Applying the Immune System Approach to Sporting Event Cybersecurity

Simpler, Smarter Security With Intelligent Orchestration

IBM’s new Intelligent Orchestration offering enables analysts to streamline their investigations via integrations and incident response playbooks.

The post Simpler, Smarter Security With Intelligent Orchestration appeared first on Security Intelligence.

Continue reading Simpler, Smarter Security With Intelligent Orchestration

How to Choose the Right Malware Classification Scheme to Improve Incident Response

Analysts can improve and automate their incident response processes by adopting the right malware classification scheme according to specific threat management goals.

The post How to Choose the Right Malware Classification Scheme to Improve Incident Response appeared first on Security Intelligence.

Continue reading How to Choose the Right Malware Classification Scheme to Improve Incident Response