How to strengthen your Cyber Resilience with Compromise Assessment
In this article, our author shows how Compromise Assessment can meaningfully extend traditional IT security tools to help organizations achieve robust cyber resilience.
In this article, our author shows how Compromise Assessment can meaningfully extend traditional IT security tools to help organizations achieve robust cyber resilience.
What benefits do SOAR solutions actually offer in concrete terms, and what do companies achieve with them? We provide answers to the 5 most frequently asked questions about SOAR!
Learn in this article how you can realize effective, sustainable and reliable threat detection through the interaction of NDR, EDR and SIEM.
Today many businesses rely on virtualization technology to run and scale their infrastructure. One of the most popular Hypervisor systems on the market is VMware ESXi, which is regularly targeted in Ransomware attacks for the last 3+ years to increase damage to the victims IT systems.
In order to minimize monetary and reputational damage in the event of a successful IT security attack, immediate and correct response measures, a comprehensive overview of the extent of the cyber attack, and a full clarification of the incident are indispensable.
Due to recent events, the SECUINFRA Falcon Team strongly recommends updating the firmware of VPN/remote access solutions from the manufacturers SonicWall, Fortinet and Citrix.
Many KRITIS companies face the challenge of meeting the requirements of the IT Security Act 2.0.
In this article, you will find out how these two approaches differ and when it makes sense for your company to choose a Fully or Co-Managed Detection and Response Service.
In contrast to SIEM, log management plays a rather subordinate role in the IT security context. This is not entirely justified, because it offers many advantages that are otherwise associated with the topic of SIEM.
EDR, XDR or MDR are currently considered relevant security responses to current and future threats.