A lot of system admins seem to either be asking or are being asked the question: "Why should we keep antivirus/EDR if it can cause the kind of damage we saw from the Crowdstrike incident?" We have to guide the conversation to the right questions, not the easy questions. This isn't a question about avoiding risk, it's a question about aligning risk posture to strategy. "What does our organization require for operations and competitive advantage?" "How do InfoSec capabilities support our ability to operate?" or "What will go wrong and how can we provide assurance?" "What requirements or limitations exist that can help inform our selection of technologies to deliver an InfoSec capability?" "Are our InfoSec capabilities enhancing our competitive advantage?" This aligns at a high level with the questions that frame the "Threat Modeling With ATT&CK" project. It's a good read and worth the time. https://lnkd.in/gGU3F8EX
Jon King’s Post
More Relevant Posts
-
how many cybersecurity tools do you have, let Coro come in and protect your digital space.
Do these symptoms sound familiar? 🤷 Overwhelmed staff 🚨 Missed critical security alerts 😵💫 Dozens of confusing tools Our 2024 SME Security Workload Impact Report reveals the stark reality: this is the daily grind for countless small-to-medium enterprises (SMEs). If you relate, what are you doing to solve it? (Coro can help, but you probably already know that 😉)
To view or add a comment, sign in
-
Question for the masses... 1. Is security important to your organization? 2. Is security "At risk" due to - Budget/Bandwidth/Lack of eligible prospects to fill an empty spot/Terminations/Leave of absence(s)? Is there a "Hole/Gap" where a person or solution would be helpful? 3. Is the current SOC keeping up? In need of a "Tune up"? Is it something that you need to address for your budget? 4. Would having an real-time estimated "Effort" (Cost) be of interest? The reason for these questions are straightforward and have no intended "Spin" on them. So if you answered "Yes" to any one of these I can provide baseline information for you and information is powerful. Allow me to be of service. https://lnkd.in/dBkZk2bP
To view or add a comment, sign in
-
In this video: https://bit.ly/3QrplU3, we uncover the 3 biggest risks to your company's network, data, and operations and the answer may not be what you think. It's actually your employees, their devices, and endpoints. But, how do you protect your company from these risks? Managed Detection & Response (MDR) and Endpoint Security are the tools that can help and Conscious Networks has a U.S. based team of professionals to help you implement these important programs to protect your business. Schedule a free consultation or risk assessment at www.Conscious.net #MDR #endpointsecurity #consciousnetworks #CyberSecurity
What is the biggest risk to business data? MDR & Endpoint Security can be a vital solution.
https://www.youtube.com/
To view or add a comment, sign in
-
In this video: https://bit.ly/3QrplU3, we uncover the 3 biggest risks to your company's network, data, and operations and the answer may not be what you think. It's actually your employees, their devices, and endpoints. But, how do you protect your company from these risks? Managed Detection & Response (MDR) and Endpoint Security are the tools that can help and Conscious Networks has a U.S. based team of professionals to help you implement these important programs to protect your business. Schedule a free consultation or risk assessment at www.Conscious.net #MDR #endpointsecurity #consciousnetworks #CyberSecurity
What is the biggest risk to business data? MDR & Endpoint Security can be a vital solution.
https://www.youtube.com/
To view or add a comment, sign in
-
===𝐁𝐎𝐎𝐌, Check Point Software 𝐝𝐨𝐞𝐬 𝐢𝐭 𝐚𝐠𝐚𝐢𝐧!! === HOT OF THE PRESS, AV-Comparatives evaluated 12 #XDR,#EPP,#EDR (collectively known as Endpoint Prevention and Response-EPR) Check Point #Harmony solution achieved the highest #prevention and response rate as well as the leading 5 year TCO $ value. AV-Comparatives’ Endpoint Prevention and Response Test, is the 𝐢𝐧𝐝𝐮𝐬𝐭𝐫𝐲’𝐬 𝐦𝐨𝐬𝐭 𝐜𝐨𝐦𝐩𝐫𝐞𝐡𝐞𝐧𝐬𝐢𝐯𝐞 evaluation of these security solutions. The 12 products tested were subjected to 50 𝐝𝐢𝐬𝐭𝐢𝐧𝐜𝐭 𝐭𝐚𝐫𝐠𝐞𝐭𝐞𝐝 𝐚𝐭𝐭𝐚𝐜𝐤 scenarios, incorporating diverse techniques and attack vectors. These scenarios were designed to simulate real-world threats progressing through three key phases: 1)𝐄𝐧𝐝𝐩𝐨𝐢𝐧𝐭 𝐂𝐨𝐦𝐩𝐫𝐨𝐦𝐢𝐬𝐞 𝐚𝐧𝐝 𝐅𝐨𝐨𝐭𝐡𝐨𝐥𝐝 2)𝐈𝐧𝐭𝐞𝐫𝐧𝐚𝐥 𝐏𝐫𝐨𝐩𝐚𝐠𝐚𝐭𝐢𝐨𝐧 3)𝐀𝐬𝐬𝐞𝐭 𝐁𝐫𝐞𝐚𝐜𝐡 The test assessed whether each solution automatically blocked the threat (active response) or provided actionable intelligence that an administrator could use to intervene (passive response). to access the full report visit: https://lnkd.in/dcNejYeu Kudos Ofir Israel, Dedi Shindler and team
To view or add a comment, sign in
-
In my recent blog post, I delve into the significance of endpoint protection for small and medium-sized businesses (SMBs). Do you have any further insights to share on this topic? https://lnkd.in/eDZgF4AQ
The Importance of Endpoint Security for SMBs
substack.cpf-coaching.com
To view or add a comment, sign in
-
As cybersecurity professionals, we should be empathizing with (and learning from) Crowdstrike’s recent incident. Not pointing fingers. Crowdstrike’s Root Cause Analysis report makes an effort to provide more insights about what led to the Windows machines blue screen of death incident. I think that,, instead of dwelling on the lack of sophistication in a particular area of their business, we should turn instead to what we can collectively learn as an industry: ✅ Are we over-relying on single platforms? What are the trade-offs associated with having vendor consolidation vs diversifying them? ✅ We have not designed IT infrastructure to be resilient and agile enough to operate in the way that modern software products demand today, including failover mechanisms. ✅ We need to excel and never lower the bar when it comes to secure software development lifecycle and delivery. Yes, it’s true that Crowdstrike could have done a few things differently.But when these things happen, we as cybersecurity experts shouldn’t spend pointless energy on assigning blame. Rather, we should remain calm, and work instead on getting everyone to row in the same direction: past the issue and toward future solutions.
To view or add a comment, sign in
-
Xerox® Security Solutions Security is a top priority for us, and we know it is for your business, too. Through the lessons we shared with #Unlockables1 We all know that your employees are built for 24/7 security management, but how do you protect data beyond your Firewall? #XeroxSECURITY #XeroxAPPs #UnLockables2
Security for People Who Aren't Wired for Constant Data Protection, Part 2
https://www.youtube.com/
To view or add a comment, sign in
-
A best security practice is requiring engineers to use MFA when tapping into data environments… I know the process may not always be, “convinient”… but getting hacked because of limited authentication due to impatience is INCONVENIENT… it will cost you!
To view or add a comment, sign in