Skip to content
Blog Contact Us
Delta Risk logo
  • SOC-as-a-Service
    • SOC-as-a-Service Overview
    • SaaS Application Security
    • Cloud Infrastructure Security
    • Network Security
    • Endpoint Security
  • ActiveEye Platform
  • Security Services
    • Security Services Overview
    • Cloud Security Professional Services
    • Pen Testing & Assessments
    • Incident Response Services
    • Cyber Threat Hunting
    • Cyber Security Exercises
    • Compliance & Strategy
  • Resources
    • Cyber Security Resources
    • CISO Guidebook
    • Data Sheets
    • Events
    • Videos
    • White Papers
  • About
    • About Delta Risk
    • Board
    • Leadership
    • News
    • Careers
    • Partners
  • Blog
  • Contact

Author: Macie Thompson

Images of security surrounding a laptop computer.

The Skills and Qualifications Incident Response Professionals Need to be Successful

April 2, 2019 | by Macie Thompson

One of our most popular blog posts covers the skills and qualifications required to be a successful penetration tester, so we decided to follow up with a similar post outlining the skills and qualifications incident response professionals need. It’s a commonly known fact that cyber security is a growing industry and organizations are always looking for new talent. Incident… Read More

Categories: Incident Response
aws incident response

The Top 3 Open Source Tools for AWS Incident Response

August 10, 2018 | by Macie Thompson

Welcome to our third blog on incident response in the cloud. The first two posts primarily focused on the built-in capabilities from cloud service providers that can help your incident response efforts. We also discussed how to configure your Amazon Web Services (AWS) environment to take advantage of those features. Today, we are going to look at some tools that are… Read More

Categories: Cloud Security | Tagged: aws, aws incident response, cloud security, incident response
aws environment

How to Prepare Your AWS Environment in Advance of a Cyber Security Incident

June 4, 2018 | by Macie Thompson

In a previous blog, I covered four cloud features that can help incident response teams. In today’s blog, I’m focusing on how to prepare your Amazon Web Services (AWS) environment so you can reduce your stress levels if and when you have an actual cyber security incident. Incident response can be extremely stressful, especially when you find an… Read More

Categories: Cloud Security
incident response in the cloud

Incident Response in the Cloud: 4 Ways to Improve Your Investigation and Containment Capabilities

April 12, 2018 | by Macie Thompson

Dealing with the aftermath of an incident in a cloud environment can be a daunting scenario given the challenges that cloud infrastructure security presents. Depending on how many systems and applications you host in various cloud environments (including through your third-party connections), a single incident can have far-reaching consequences. Moreover, without physical access to your systems, lack… Read More

Categories: Cloud Security | Tagged: aws, cloud infrastructure security, incident response
RSS Feed

Recent Posts

  • New ActiveEye Features Speed Threat Response, Improve Productivity September 10, 2020
  • 5 Tips for Kickstarting Your Cyber Security Program August 28, 2020
  • 4 Cyber Incident Scenarios You Should Exercise and Test August 20, 2020
  • How to Deal with Ransomware in 2020 August 14, 2020
  • Our Best Cyber Security Blogs of 2020: Mid-Year Update July 29, 2020

Categories

  • AWS Security
  • CISO
  • Cloud Security
  • Critical Infrastructure
  • Cyber Insurance
  • Cyber Security Awareness
  • Cyber Security Exercises
  • Cyber Security Hiring
  • Cyber Security Strategy
  • Cyber Security Threats
  • Data Privacy
  • Data Security
  • Employee Training and Awareness
  • Endpoint Security
  • Financial
  • G Suite Security
  • Healthcare
  • Incident Response
  • Information Security
  • Insider Threat
  • IT security
  • Legal
  • Malware
  • Managed Security
  • Managed Services
  • Network Security
  • News and Events
  • Patching
  • Penetration Testing
  • Public Sector
  • Ransomware
  • Risk and Compliance
  • SOC-as-a-Service
  • Social Engineering
  • Threat Hunting
  • Uncategorized
Delta Risk logo
106 S. St. Mary's Street
Suite 601
San Antonio, TX 78205

Other Locations

Managed Security Services

  • SOC-as-a-Service
  • SaaS Application Security
  • Cloud Infrastructure Security
  • Network Security
  • Endpoint Security
  • ActiveEye Platform

Security Services

  • Services Overview
  • Cloud Security Services
  • Pen Testing
  • Incident Response
  • Compliance
  • Assessments

Company and Resources

  • Leadership
  • News
  • Resources
  • Blog

© 2025 Delta Risk | All Rights Reserved

Privacy Policy | Your California Privacy Choices | EO/AAE | Sitemap | Contact