In order to minimize monetary and reputational damage in the event of a successful IT security attack, immediate and correct response measures, a comprehensive overview of the extent of the cyber attack, and a full clarification of the incident are indispensable.
Due to recent events, the SECUINFRA Falcon Team strongly recommends updating the firmware of VPN/remote access solutions from the manufacturers SonicWall, Fortinet and Citrix.
Fully or co-managed detection & response service - in this article you can find out how these two approaches differ and when which service makes sense for your company.
In contrast to SIEM, log management plays a rather subordinate role in the IT security context. This is not entirely justified, because it offers many advantages that are otherwise associated with the topic of SIEM.
OT security - i.e. the protection of operational technology, production facilities, industrial plants or infrastructure facilities - is still in the shadows.
Why do so few women work in IT? When I started working on this text, I realized once again that as a woman in the IT industry, I will still be part of a small minority in 2022.