RSA Advanced SOC Solution

3 Steps to a Secure ICS Network

Industrial Control Systems (ICS) attacks have a direct impact on people’s lives. The consequences of these attacks can be unpredictable, which is why ICS protection is a hot topic in security right now. Defining the right protection layer and best approach to secure communications in this environment is crucial. Historically, ICS departments operated independently from…

Tales from the Black Hat NOC: The Stages of Security Adolescence (Part 2)

In Part 1 of “Tales of the Black Hat NOC: The Stages of Security Adolescence,” I discussed the maturation process of the Black Hat NOC, and security strategies in general.  In the blog post below – you can see the adjustments we made and additional steps we took towards optimizing our NOC at Black Hat. …

Tales from the Black Hat NOC: The Stages of Security Adolescence (Part 1)

Maturity is often spoken of in the security community as a binary value – “Customer X is mature,” “Customer Y is immature…” This notion was not dispelled at Black Hat where one vendor after another claimed, “Evolve your security. Buy our product and stop breaches today!” But we know that maturity is not binary, and neither is…

Tales from the Black Hat NOC: I’ll Show You Mine, We Can Already See Yours

With the start of Black Hat 2016 merely a day away, white, black, and grey hats from around the world are whetting their appetites – eagerly waiting to show off and consume the fruit of an entire year’s research. Whether for education, research, bragging rights, or mal-intent, the Black Hat network will host anything from basic brute force attacks to…

Improving Your Incident Detection & Response Maturity

Just having come back from the most recent RSA Conference in San Francisco, I think I can say with confidence that the security industry has moved beyond, at least at the level of strategic planning, security strategies which are purely based on prevention. Security professionals generally agree that what is needed is a better balance…