Japan

ISMS

Security Monitoring and the ASD ISM

Comparing legislative and compliance security frameworks, you will see a definite synergy in what they suggest is important to security monitoring. Interestingly, their focus isn’t on collecting every piece of information and security-related event,...

Read More

Explore The Zero Trust Cyber Security Model

A contemporary defensive cyber security model, known as zero trust, requires organisations to fully develop and integrate the means to detect unwanted or suspicious behaviour throughout their business architecture. The legacy view that cyber security...

Read More

How to Improve Security Monitoring in your SOC

In an earlier blog post we looked at how security operations centre (SOC) teams can shift their services up a gear, through better automation, behavioural analysis and threat hunting. The concept of threat hunting isn’t new to security operations; yet,...

Read More

Combat Insider Threats with your SIEM

Monitoring privileged access from your SOC is the best way to detect potential insider threats.  Recently, several news stories have shown how important it is to have the tools in place to manage the threat of rogue employees with too many privileges....

Read More

Choosing a SOC Service Model: The Key Considerations

What factors do CISOs take into account when choosing a SOC service model?  Information security is high on the agenda of every UK and Australian board these days, especially given the changes in privacy legislation and mandatory data breach notification....

Read More
1 2 3