These days attacks are becoming more sophisticated and more common. Mobile
devices, cloud computing and the Internet of Things have increased the number
of access points that must be secured. To complicate matters, CISOs are been
directed to secure system without compromising the seamless experience that
customers expect across channels, and if the organization is in a regulated
industry, compliance issues likely increase the team's workload.
To best detect threats and respond to incidents quickly, many organizations
decide they need a security operations center to provide proper protection
and continuous prevention. Then they must decide whether to build an internal
Security Operations Center (SOC) or outsource.
Advantages and Disadvantages of an Internal SOC
The advantages of building an internal SOC include:
A dedicated staff that knows the particular environment an... (more)
It is not often that movies and television shows give viewers the opportunity
to explore the world of hacking and digital security in a realistic manner.
After two seasons, "Mr. Robot" has attracted its share of IT professionals as
well as average citizens. The show has offered numerous depictions that are
of particular interest to those who make their living by protecting their
The critically acclaimed television series offers fictional situations rather
than documentary evidence. However, the plots and actions of both the
security engineers and hackers are reali... (more)
We continue with the second part of our two-part series. If you missed the
first part, we are discussing what security professionals can learn from the
hit series, "Mr. Robot." The series explores the world of organized hacking
as well as the security measures being used to stop the hackers.
Vulnerabilities Abound in the Internet of Things
During the two seasons that the show has aired, viewers have seen examples of
how hackers can exploit connected devices. One of the most extreme examples
was when hackers took over the attorney's smart home, generating a nightmare
of constantly ... (more)
A data breach could happen to anyone. Data managed by your company is
valuable to someone, no matter what the data is. Everything has a price tag
on the dark web. It is especially true when it is customer data, such as
personal and payment card details.
When your customers' data turns up somewhere unexpected on the Internet, you
may feel the world is collapsing around you. People start tweeting about the
hack, angry customers phone in, and Brian Krebs publishes his first article.
Your organization switches to an emergency mode to handle the situation. It
is the time when your in... (more)