Follow Us:

Trusted Information Security Insights

Hunting the foxes before they get to the hen house

By nature, foxes are attracted to hens. And like all predators, they’ll look for the easy meal. So, leaving the hen house unlocked is like putting out a neon sign advertising an all-you-can-eat buffet.  …

Written by BTB

Phishing 2.0: Old tricks still net big bucks

We’ve all heard stories of employees who got an email from their boss asking them to purchase gift cards or share sensitive corporate information. Who would fall for that, you might think? But spoofed emails purportedly from company execs or vendors are on the rise. Read on by clicking here or on the image to learn the latest on phishing scams and how to protect yourself and your organization.…

Written by BTB

How to cope with the growing wave of data privacy regulation

Keeping up with data and privacy protection regulations is an on-going challenge for companies that do business, especially with the high bar set internationally by GDPR. The trend has moved stateside as the California Consumer Privacy Act (CCPA) has been introduced bringing stringent regulations similar to the GDPR to the U.S.…

Written by Humberto Gauna

Common and Best Practices for SOCs: Results of the 2019 SANS SOC Survey

SANS conducts a global Security Operations Center (SOC) survey yearly to identify current trends, while providing best practices to enable organizations to build, manage, maintain and develop their SOCs effectively and efficiently. The results are in! The approach used this year adapted and was structured around the five major functions of the NIST Cyber Security Framework (CSF)–Identify, Protect, Detect, Respond, and Recover. The approach may not have been perfect in its execution, but did highlight the fact that many security tools operate cross-functionally, serving multiple purposes. The decision to map the survey to the NIST CSF is an indicator of the increasing importance of third-party control frameworks. Key Highlights: Lack of skilled staff is still a major concern with large percentage of respondents (58%), citing this as one of the key areas preventing success Lack of tool integration, with 43% of the respondents citing that their tools don't work together to give them comprehensive coverage and visibility across their enterprise Lack of automation and orchestration, allowing analysts to do their job more effectively and focus on higher importance alerts and incidents Get the results For more insights on SOC trends and to read the full report, click the link below. Here's another BTB Security "No BS" move, it's not behind a gate....seriously. Read it, enjoy it, learn from it. …

Written by BTB

Don’t Fall Victim to Cybersecurity Scare Tactics

Walk into any major cybersecurity conference, and you’ll feel like you are walking into the trailer for a horror movie.…

Written by Ron Schlecht Jr.

GO BEYOND THE BASICS

Our clients trust us to keep their businesses resilient. How secure is your organization?
Schedule Consultation

Detect: Assessments & Testing

Defend: Comprehensive Monitoring

Defeat: Incident Response & Forensics