procedures

Splunk: Cybercriminals Use These Types of TTPs
A report published by Splunk that analyzed three years of data showed a marked increase in the number of cyberattacks that employ four specific types of techniques. Based on analysis of data ...

Why We Should Focus on ‘How,’ not ‘Who,’ of Cyberattacks
Organizations often don’t understand what they need to be protecting themselves from when it comes to costly cyberattacks. The threat landscape is becoming ever more evolved and it’s now rare for a ...

How ITIL Can Improve Information Security
By: Steven Weil Introduction ITIL - the Information Technology Infrastructure Library - is a set of best practices and guidelines that define an integrated, process-based approach for managing information technology services. ITIL ...
Rewriting the Code
"Can you take a quick look at this please, Rob?"The 'Group' of which our company is the shining star (i.e. highest returns) has been trying to put together what they refer to ...