Remove magic-security-dust
article thumbnail

MITRE ATT&CK: The Magic of Segmentation

Cisco Security

As the Cybersecurity and Infrastructure Security Agency (CISA) continues investigating, they reported on January 6 that “one of the initial access vectors for this activity is a supply chain compromise.”. There are still a lot of unknowns with this attack, but the security lesson is clear: Trusted relationships must be built on zero trust.

article thumbnail

Stealing More SRE Ideas for Your SOC

Anton on Security

As we discussed in “Achieving Autonomic Security Operations: Reducing toil” (or it’s early version “Kill SOC Toil, Do SOC Eng” ), your Security Operations Center (SOC) can learn a lot from what IT operations learned during the SRE revolution. However, both security operations center practitioners and SREs agree?—?consistency

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Stealing More SRE Ideas for Your SOC

Security Boulevard

As we discussed in “Achieving Autonomic Security Operations: Reducing toil” (or it’s early version “Kill SOC Toil, Do SOC Eng” ), your Security Operations Center (SOC) can learn a lot from what IT operations learned during the SRE revolution. However, both security operations center practitioners and SREs agree?—?consistency

article thumbnail

New Age Network Detection: Introduction

Security Boulevard

Bringing the secure network to the employee represents a better option to solve these requirements instead of forcing the employee onto the secure network. The network offers a secure connection; thus, you no longer backhaul traffic on-prem to run through the corporate web proxy or go through a centralized VPN server.