Resolution1 Security

 

Cybersecurity Blog

 
 

Rapid Detection and Response Model Guide

Empowering Our Global Channel to Grow Their IR Business - Part 2 of 2

Empowering Our Global Channel to Grow Their IR Business - Part 1 of 2

Three Alternatives to Obama’s Cybersecurity Proposal

Rapid Detection and Response Model Guide

By Lucas Zaichkowsky

As our industry faces a huge demand for security experts and knowledge, today’s information security practitioners have struggled to keep up with the sophistication of cyberattacks and growing technological complexities. Customers tell us they need help – a demand for in-depth guidance on maturing threat detection and response capabilities. The current available resources tend to focus on fundamentals and lack the answers needed by organizations facing real world challenges.

Read Article

Tags: cybersecurity, incident_response, lucas_zaichkowsky, soc, threat_detection, white_paper,

 

Empowering Our Global Channel to Grow Their IR Business - Part 2 of 2

By Neil Batstone

Neil Batstone, VP of Global Alliances & Channel, sat down with Judy Kaneko, Director of Corporate Communications, to discuss Resolution1 Security’s global channel and alliance program for 2015.

Read Article

Tags: channel, global, incident-response, neil-batstone,

 

Empowering Our Global Channel to Grow Their IR Business - Part 1 of 2

By Neil Batstone

Neil Batstone, VP of Global Alliances & Channel, sat down with Judy Kaneko, Director of Corporate Communications, to discuss Resolution1 Security’s global channel and alliance program for 2015.

Read Article

Tags: channel, global, incident-response, neil-batstone,

 

Three Alternatives to Obama’s Cybersecurity Proposal

By Sean Mason

Since incident response is generally an after-thought to most companies and not well understood, the level of concern that this time frame has generated is understandable. In contrast, I believe the 30-day window, while a step in the right direction, will drive the wrong behaviors. What Obama’s proposed legislation should address is the rapid detection and response of cyber intrusions on networks. I would propose three alternatives...

Read Article

Tags: cybersecurity, incident-response, sean-mason, state-of-the-union,

 

Why Obama's Cybersecurity Proposal Misses the Mark

By Sean Mason

This blog is not intended to be a political commentary, but rather the perspective of someone who has been responding to incidents for years, as well as a previous member of the public-private sharing organization known as the Defense Industrial Base.

Read Article

Tags: cyber, defense industrial base, obama, reform, sean_mason, target,

 

Take Charge, Amp up your Incident Response in 2015

By Kristen Cooper

The new release of Resolution1 Cybersecurity 5.6 offers a number of fantastic resources, products and services to help you take back control features including the ability to track and report on incidents with key performance metrics, monitor mobile devices, Manage threat feeds no matter where you are plus much more!

Read Article

Tags: cybersecurity, cyber_security, kristen_cooper, mobile, monitor, report, threat, track,

 

Announcing the Resolution1 Customer Enablement Portal

By Sean Mason

As an incident responder leader building IR operations from the ground up for major companies, I recognize that you are only as strong as the community you operate in, and how effectively your incident responders are able to leverage their investments. Our Resolution1 Customer Enablement Portal is a commitment to our customers that we are here to help make them successful.

Read Article

Tags: customer support, incident response, sean mason,

 

I Ran ThreatScanner and Got Results, Now What?

By David Trollman

We recently made a community freeware tool, ThreatScanner, available to help security professionals determine if a suspected endpoint has been compromised by the Regin or the destructive Sony malware. As a result, we received a number of questions about what to do if an organization had a positive hit. So I’ve compiled a list of five things to do and not to do if you think ThreatScanner results point to a Sony malware (aka WIPALL) or Regin compromise.

Read Article

Tags: check, david trollman, malware, reboot, threat, threatscanner,

 

Top 2015 Resolutions: The World Has Changed - Take Control

By Sean Mason

Major Information Security themes for 2015: be prepared and responsive to the major attacks their organizations face. To us, it’s about maximizing our customers’ current cybersecurity investments, and expanding their ability to proactively detect and respond- as opposed to waiting for the inevitable to happen. As we’ve continued to see, times have changed and CISO’s and their teams are expected to do considerably more now.

Read Article

Tags: attack, cyber, holiday, hunting, tips,

 

SONY: What the real story should be.

By Justin Harvey

It should come as no surprise to security industry veterans that there are bad guys out there…whether they are state-sponsored, cybercriminals for profit or hacktivists. As it relates to the Sony Pictures breach, we are certainly surprised about the North Korea involvement for two reasons:

Read Article

Tags: cyberattack, incident-response, justin-harvey, sony,

 

 1 2 3 >  Last ›