Skip to content
Blog Contact Us
Delta Risk logo
  • SOC-as-a-Service
    • SOC-as-a-Service Overview
    • SaaS Application Security
    • Cloud Infrastructure Security
    • Network Security
    • Endpoint Security
  • ActiveEye Platform
  • Security Services
    • Security Services Overview
    • Cloud Security Professional Services
    • Pen Testing & Assessments
    • Incident Response Services
    • Cyber Threat Hunting
    • Cyber Security Exercises
    • Compliance & Strategy
  • Resources
    • Cyber Security Resources
    • CISO Guidebook
    • Data Sheets
    • Events
    • Videos
    • White Papers
  • About
    • About Delta Risk
    • Board
    • Leadership
    • News
    • Careers
    • Partners
  • Blog
  • Contact

Author: Andrew Cook

threat hunting solutions

Why Most Real-Time Defensive Solutions Are Poor Threat Hunting Solutions

July 20, 2018 | by Andrew Cook

When you enlist a hunt team to run compromise assessments, it’s important to determine which solutions and processes they’re using to actively hunt down threats. After all, compromise assessments (time-bound or more focused projects) are proactive efforts to detect persistent threats that have evaded existing security controls. You must adopt the mindset that your existing controls have already… Read More

Categories: Threat Hunting | Tagged: compromise assessment, cyber threat hunting, hunt operations

Predicting the Future of Ransomware and Crypto Mining in the Cloud

March 21, 2018 | by Andrew Cook

Ransomware is today’s menace. It’s profitable, simple to pull off, and can hit organizations of any size. In this blog post, we look at the future of ransomware and related attacks and speculate about what the migration to cloud environments might mean for the threat landscape.

Categories: Cloud Security, Ransomware
threat hunting best practices

Threat Hunting Best Practices: Be Ready to Hunt When Cyber Criminals Strike

March 2, 2018 | by Andrew Cook

When the term “threat hunting” is brought up in the cyber security community, it can come across as more of a buzzwordthan a viable and important strategy for organizations to adopt. While there is plenty of discussion about what threat hunting means and why having a hunt program is important, the mindset, methods, and key steps… Read More

Categories: Cyber Security Threats | Tagged: compromise assessment, cyber threat hunting, incident response
incident response strategy

Incident Response Strategy: Determining Where to Invest

February 15, 2018 | by Andrew Cook

It can be hard to plan for a security incident if you’ve never experienced one first hand. Incidents involve unauthorized access, denial of service, presence of malicious logic, and improper usage. As an incident responder, I’ve seen plenty of these situations play out. I was fortunate to share some of my experiences and lessons with… Read More

Categories: Incident Response | Tagged: incident response, incident response planning, incident response strategy
incident response assumptions

Avoid These Common Incident Response Assumptions and Planning Mistakes

November 17, 2017 | by Andrew Cook

Last week, I took part in one of SecureWorld Seattle’s panels, “Manage the Damage – The Current Threat Landscape.” This panel focused on the topic of developing, fine-tuning, and practicing incident response plans to be better prepared for a breach. The moderator, Jean Pawluk, and the crowd in attendance, asked some thought-provoking questions about common incident response challenges that businesses face…. Read More

Categories: Incident Response | Tagged: cyber exercises, data breach detection, incident response planning, tabletop exercises
incident response best practices

Incident Response Best Practices: What You Can Expect During the First Call

August 18, 2017 | by Andrew Cook

Imagine this scenario: you’ve just discovered your network has been breached. You need to get a handle on the situation quickly but you’re still trying to figure out what happened. What are the incident response best practices you should follow? As cyber security consultants, we know the first few moments of an incident can be highly… Read More

Categories: Incident Response | Tagged: cyber security consultants, data breach, incident response
  • 1
  • 2
  • Next »
RSS Feed

Recent Posts

  • New ActiveEye Features Speed Threat Response, Improve Productivity September 10, 2020
  • 5 Tips for Kickstarting Your Cyber Security Program August 28, 2020
  • 4 Cyber Incident Scenarios You Should Exercise and Test August 20, 2020
  • How to Deal with Ransomware in 2020 August 14, 2020
  • Our Best Cyber Security Blogs of 2020: Mid-Year Update July 29, 2020

Categories

  • AWS Security
  • CISO
  • Cloud Security
  • Critical Infrastructure
  • Cyber Insurance
  • Cyber Security Awareness
  • Cyber Security Exercises
  • Cyber Security Hiring
  • Cyber Security Strategy
  • Cyber Security Threats
  • Data Privacy
  • Data Security
  • Employee Training and Awareness
  • Endpoint Security
  • Financial
  • G Suite Security
  • Healthcare
  • Incident Response
  • Information Security
  • Insider Threat
  • IT security
  • Legal
  • Malware
  • Managed Security
  • Managed Services
  • Network Security
  • News and Events
  • Patching
  • Penetration Testing
  • Public Sector
  • Ransomware
  • Risk and Compliance
  • SOC-as-a-Service
  • Social Engineering
  • Threat Hunting
  • Uncategorized
Delta Risk logo
106 S. St. Mary's Street
Suite 601
San Antonio, TX 78205

Other Locations

Managed Security Services

  • SOC-as-a-Service
  • SaaS Application Security
  • Cloud Infrastructure Security
  • Network Security
  • Endpoint Security
  • ActiveEye Platform

Security Services

  • Services Overview
  • Cloud Security Services
  • Pen Testing
  • Incident Response
  • Compliance
  • Assessments

Company and Resources

  • Leadership
  • News
  • Resources
  • Blog

© 2025 Delta Risk | All Rights Reserved

Privacy Policy | Your California Privacy Choices | EO/AAE | Sitemap | Contact