In part two of our SOC-as-Service overview, we’ll look at how a cloud-based security operations center (SOC) can improve AWS and Azure security, and why you should consider this instead of build a SOC. As we discussed in our previous post, many organizations are turning to SOC-as-a-Service to get the cloud security expertise they need without having to… Read More
What Defines a Modern SOC-as-a-Service Solution? [Part I]
In today’s post, the first of a two-part series, we’ll discuss what defines a modern SOC-as-a-Service solution, also known as outsourced or co-managed security operations center (SOC). Whether it’s to supplement experience of in-house security teams, optimize detection and response efforts, or a combination of these, SOC-as-a-Service can provide a lot of advantages that traditional outsourced security… Read More
Lessons from the Baltimore Cyber Attack—Are You Doing Enough to Protect Your Business?
Baltimore is feeling the heat from a recent cyber attack involving ransomware that’s crippling the city’s computers. News reports say experts are debating if the strain of ransomware involved in the attack, Robbinhood, leveraged NSA hacking tool EternalBlue. While the Baltimore incident is getting the most attention, other local governments are being hit, too. Earlier this year, two… Read More
[New Research] 2019 Cloud Security Report Reveals Top Challenges
The new 2019 Cloud Security Report is here, and we’re excited to share it with you. The report includes the latest cloud security trends and data points to help you benchmark how your own organization is doing. It also has insights into cloud security threats, organizational investment priorities, and solutions. Delta Risk partnered with our colleagues at… Read More
Managing Your Security Logs: More than Just Set and Forget
Organizations log thousands of security-related events every day from an array of devices and software. So, what’s the best way to go about managing your security logs? The reality is, most of the time, no one looks at these logs unless they have a security incident or data breach. Some security professionals suggest that if… Read More
Are Your Third-Party Vendors Putting You at Risk?
The past few years have given us not only a staggering amount of Marvel movies, but eye-wateringly expensive data breaches. Some of the most costly and devastating breaches occurred as a result of cyber criminals taking advantage of security weaknesses in third-party vendors. So, are your third-party vendors putting you at risk? Even a single… Read More