Category: Cybersecurity incident management

July 28, 2023 | by Gilad Maayan
DevSecOps

The DevSecOps Toolchain: Vulnerability Scanning, Security as Code, DAST & More

What Is DevSecOps?  DevSecOps is a philosophy that integrates security practices within the DevOps process. DevSecOps involves creating a ‘security as code’ culture with ongoing, flexible collaboration between release engineers and security teams. The main aim of DevSecOps is to make everyone accountable for security in the process of delivering high-quality, secure applications. This culture … Continued

read more
July 14, 2023 | by Ritika Bramhe
Incident Tracking

How Incident Tracking Can Benefit Your IT Organization

In the dynamic world of Information Technology (IT), incident tracking is a critical process within the realm of incident management that can significantly influence an organization’s operational efficiency and service quality. Incident management refers to the identification, recording, and management of incidents—unplanned events or disruptions—that can impact IT services.  Understanding Incident Tracking Incident tracking involves … Continued

read more
May 15, 2023 | by OnPage Corporation
incident response tools

7 Types of Incident Response Tools

What Are Incident Response Tools and Why Are They Important? Incident response tools are software applications or platforms designed to assist security teams in identifying, managing, and resolving cybersecurity incidents. Incident response is a crucial part of an organization’s cybersecurity strategy, making it possible to detect threats, analyze vulnerabilities, respond to attacks, and recover from … Continued

read more
March 29, 2023 | by Gilad Maayan
Top 5 managed detection and response services

Top 5 Managed Detection and Response Services and How to Choose

What Is Managed Detection and Response (MDR)? Managed Detection and Response (MDR) is an approach to cybersecurity that combines advanced technologies, skilled analysts, and a proactive response process to detect, investigate, and remediate cyber threats. MDR is typically delivered as a service by a third-party provider and includes a range of security capabilities, such as … Continued

read more
March 9, 2023 | by Zac Amos
network security monitoring

5 Tips to Improve Network Security Monitoring

Optimizing network security monitoring requires pursuing continuous improvement. Even when people have monitoring tools or processes, it’s always advisable to identify weak spots and look for ways to reduce or eliminate them. Here are five options to consider. 1. Build a Digital Twin A digital twin is an exact digital replica of a physical asset … Continued

read more
December 9, 2022 | by Ritika Bramhe
AWS reInvent

Recapping this year’s AWS re:Invent 2022

Amazon recently concluded their five-day long conference, AWS re:Invent 2022. This year’s conference was hybrid with the company streaming a significant portion of their in-person conference for free. For ten years now, the event has seen attendees across the cloud continuum come together to learn, share and get inspired. This year was no different as … Continued

read more
September 30, 2022 | by James Truslow
Cyber Posture in Health Care

Putting HC3’s Cyber Posture Recommendations into Practice

The Rising Threat of Cybercrime in Healthcare Of growing concern to both patients and the professionals who facilitate their care is the growing trend of healthcare organizations being preyed upon by cybercriminals. In the United States, recent political dialogue has brought special attention to patients’ privacy rights under HIPAA and the ongoing security of their … Continued

read more
July 13, 2022 | by James Truslow
Marriott Data Breach

What IT Pros Can Learn from the Marriott Data Breach

Despite the best efforts of individuals to protect their own data, they cannot always account for the cybersecurity shortcomings of larger organizations such as their employers, financial institutions, and healthcare providers entrusted with their personal information. Recently, it was made painfully apparent that hotels should also be added to this list of vulnerable entities based … Continued

read more

OnPage