sb-nz logo
Story image

Making your security strategy work for your organisation’s size

08 Oct 2017

Cybersecurity leaders of IT firms face an inevitable breaking point – there are too many assets that need to be protected from too many attackers.

CSOs and your peers have to sort through alerts to identify correct threat levels from too many applications, users, devices, and machines.

You face skill shortages, are understaffed, and need to contend with cybercriminals who are constantly innovating.

This is why an SOC is crucial - a team and a facility dedicated to and organised to prevent, detect, assess, and respond to cybersecurity threats and incidents round the clock.

An effective SOC will stop an attack before it starts.

CSOs have a few different options of SOCs, depending on the size and the capacity of your organisation.

Cybersecurity Consultants, Dragonfly Technologies, have created a useful guide if you’re wanting to implement an SOC, but are overwhelmed by the options available.

The right SOC will deliver maximum protection for your organisation within the resources at your disposal.

The e-book can answer your questions on:

  • What are the pros and cons of different SOC options?
  • How can an SOC help your organisation respond to security threats you're facing?
  • How can you filter out the noise to focus on signals that matter?           
Story image
UPDATED: RBNZ ascribes data breach to third-party file sharing service
“The nature and extent of information that has been potentially accessed is still being determined, but it may include some commercially and personally sensitive information,” says RBNZ Governor.More
Story image
Sophos named a Numbering Authority in CVE programme
The programme, which runs an open data registry of vulnerabilities, enables programme stakeholders to correlate vulnerability information used to protect systems against attacks. More
Story image
Microsoft top targeted brand by cyber criminals in Q4 2020
In Q4, 43% of all brand phishing attempts related to Microsoft (up from 19% in Q3), as threat actors continued to try to capitalise on people working remotely during the COVID-19 pandemic’s second wave. More
Story image
Trend Micro adds cloud-native container security to Cloud One Services Platform
Designed to ease the security of container builds, deployments and runtime workflows, the new service helps developers accelerate innovation and minimise application downtime across Kubernetes environments.More
Story image
Online gaming a 'hotbed' for DDoS attacks — report
The latency and availability issues present in online gaming, in particular, presented an attractive target to attackers, in addition to the enduring popularity of gaming in the era of COVID-19.More
Story image
CompTIA forms Cybersecurity Advisory Council, led by 16 security execs
The new body will be co-chaired by Tech Data director of security solutions Tracy Holtz, and Alvaka Networks chief operating officer and chief information security officer Kevin McDonald.More