Imagine the following scenario: you are the CIO of an organization and receive a phone call from an external party, informing you that suspicious traffic has been observed between your company network and a remote server. The incident response turns up that an attacker has been present in your network for over 6 months, and … Continue reading Finding the hidden attacker in your network
Author: tstnnck
Do you have a clue?
Vind de verborgen aanvaller in uw netwerk Stelt u zich eens voor: u krijgt als CIO een telefoontje van een externe partij dat er verdacht verkeer is gesignaleerd tussen uw bedrijfsnetwerk en een externe server. Naar aanleiding van de incident response blijkt tot uw grote schrik dat er al meer dan zes maanden een aanvaller … Continue reading Do you have a clue?
How to become cyber resilient quickly and remain in full control
Running Cyber Security Operations is crucial but difficult Successful and effective cyber security is not only about tools, but (increasingly) about the processes and people to operate those tools effectively. While organizations used to buy security tools and believed this would be sufficient, they increasingly realize that running the actual Cyber Security Operations (CSO) with … Continue reading How to become cyber resilient quickly and remain in full control