A new Chief Information Security Officer (CISO) starting the first day on the job has many challenges to juggle – navigating infrastructure complexity, keeping up with ever-changing compliance and regulatory requirements, working through team skills shortages, and overcoming inadequate funding. In April, the Ponemon Institute surveyed more than 500 CISOs to assess their level of preparedness for… Read More
Q&A Part II: Common Misconceptions About Threat Hunting and the Impact of Moving to the Cloud
Yesterday, Delta Risk’s Andrew Cook and Infocyte Founder and Chief Product Officer Chris Gerritz presented a webinar on “Threat Hunting Versus Compromise Assessments: What’s the Difference?” In advance of the webinar, Dev Panchwagh spoke with the presenters to gain more insights into this subject, including common misconceptions and the impact of moving to the cloud. Dev: I wanted to get your thoughts on the cloud…. Read More
Q&A: Common Misconceptions About Threat Hunting and Compromise Assessments
In advance of our upcoming webinar on “Threat Hunting Versus Compromise Assessments: What’s the Difference?” Dev Panchwagh spoke with the presenters, Delta Risk’s Andrew Cook and Infocyte Founder and Chief Product Officer Chris Gerritz. In Part I of this two-part blog series, the team discusses some of the common misconceptions around threat hunting and compromise assessments. Join our webinar on April… Read More
Incident Response in the Cloud: 4 Ways to Improve Your Investigation and Containment Capabilities
Dealing with the aftermath of an incident in a cloud environment can be a daunting scenario given the challenges that cloud infrastructure security presents. Depending on how many systems and applications you host in various cloud environments (including through your third-party connections), a single incident can have far-reaching consequences. Moreover, without physical access to your systems, lack… Read More
[New White Papers] Law Firms Face Cyber Security Challenges Around Client Confidentiality and Due Diligence
Law firms and law departments have a fiduciary duty to protect client data. However, their mission to maintain the confidentiality of this sensitive information is challenged every day by emerging cyber threats. Law firms are an attractive target for cyber criminals because their client data is a treasure trove for personal healthcare information, financial information,… Read More
How to Set Up AWS CloudTrail: An Important Step in Account Security
Amazon Web Services (AWS) recently announced that it was making the AWS Trusted Advisor S3 Bucket Permission Check free for all AWS users, regardless of their support subscription. While this announcement generated quite a bit of buzz in blogs and the Twitter-sphere, this capability has been free to use in AWS Config’s Public Read Rule for quite some time…. Read More