Lessons Learned in Defending Against the Log4j Vulnerability – A Case Study
Authors of this Blog Post include SecureOps Employees - Michal Kavan, SOC Director - Andrew Morrison, SOC Manager and Alejandro Perez, Sr. SOC Analyst In December, several Log4j vulnerabilities also known
The Log4j Vulnerability is Likely to be a Significant Threat for Years
Until last month, Log4j was simply a popular Java logging framework; one of the numerous components that run in the background of many modern web applications. But since the zero-day
Developing a Risk-Based Vulnerability Management Program A Real-Life Case Study
Custom Security Solutions Empower Organizations to Create Robust, Efficient Vulnerability Management Programs Vulnerability management exists for the purpose of identifying and remediating vulnerabilities in systems quickly before they are exploited. Vulnerabilities,
How to Defend Against Magecart Skimming Cyber Attacks
Defending Against Magecart Skimming Cyber Attacks Prior to the holidays last year and a couple of months before the outbreak of the Coronavirus pandemic we wrote about our concern with regard
Why and How DNS Hijacking is Increasing
The IDC Global DNS Threat Report released last summer revealed that 82% of organizations were victims of DNS attacks with each suffering an average of 9 DNS attacks which was
Why Log Monitoring and Management is Critical to IT Security
Why Log Monitoring and Management is Critical to IT Security In our last blog post titled “The Fundamentals of Network Security Analysis and Monitoring” we discussed active versus passive security devices,
Magecart Campaigns are Targeting e-Commerce Websites
Magecart is Threatening Online Businesses this Holiday Season As we suggested in an earlier blog post, there have been 5,183 breaches from the first nine months of 2019 which exposed 7.9
60% of Businesses Have Experienced a Breach in the Past Two Years
IT security professionals have seen the number of breaches as well as the percentage of organizations that admit to being breached increase year after year. However, Vanson Bourne, a UK-based
Problems and Solutions for the SOC
SOC analysts are leaving organizations and difficult to find according to a Ponemon Survey. Improving your SOC means empowering your analysts with the right tools and resources.
The Verizon 2019 Data Breach Investigations Report (DBIR) – 5 Key Insights
The release of the 2019 Verizon Data Breach Investigations Report (DBIR) has organizations on high alert for attacks that are gaining popularity and has brought renewed attention to cyber resilience,