How to Create an Effective Incident Response Plan

How to Create an Effective Incident Response Plan

Introduction An organization’s incident response plan (IRP) should be their first line of defense against attacks and threats. IRPs are manuals that describe how organizations detect and limit the... Go on to the site to read the full article ... Read More
How to Structure Your CSIRT or SOC Team

How to Structure Your CSIRT or SOC Team

Organizations must consider their wider security requirements before deciding if they require a CSIRT, a SOC or both. Pronounced see-sirt, a computer security incident response team (CSIRT) performs... Go on to the site to read the full article ... Read More
11 Points to Consider When Virtualizing Security

11 Points to Consider When Virtualizing Security

Virtualized computing resources can save organizations money, but awareness of the security implications must be to the fore in any discussion As the name suggests, virtualization creates a virtual... Go on to the site to read the full article ... Read More
A Step-by-Step Guide to Data Security Compliance by Industry

A Step-by-Step Guide to Data Security Compliance by Industry

Knowing what expertise is available and which standards are relevant to your sector are the first steps to ensure organizations are regulation compliant. In our previous article we introduced some... Go on to the site to read the full article ... Read More
A Look at Data Security Compliance & Regulations by Industry

A Look at Data Security Compliance & Regulations by Industry

Introduction Understanding and complying with regulations provides companies with business opportunities and reduces risk. To many, information security looks to be governed by an ever-changing... Go on to the site to read the full article ... Read More