While this is better than doing nothing or relying blindly on the security of cloud providers, those externalised, part-time services – often delivered remotely – are rarely the magic bullet they pretend to be…
The ability to infiltrate networks and remain undetected is a key capability for attackers to gain access to systems, hence the need for threat hunting.
It does not make sense to oppose maturity-based approaches and risk-based approaches to cyber security: They are just different ways of managing, driving and measuring action around cyber security in different situations and different firms. One does not have to be superior to the other.
by Fran Howarth · Published 23rd April 2020 · Last modified 13th July 2020
In the latest of Fran Howarth’s blogs on managed detection and response services, she looks at telemetry, which she feels is a vital ingredient to MDR.
by Fran Howarth · Published 16th April 2020 · Last modified 13th July 2020