SOAR vs. XIP – Reactive to Proactive Cyber Security Operations
top of page
The NIST Cybersecurity Framework identifies five functions (Identify, Protect, Detect, Respond, and Recover) as the five primary pillars...
Stanislaw Banaszak
- 18 kwi 2021
- 2 min
Orchestra Group conducts first APAC distie deal with emt Distribution
Will offer Orchestra’s full range of Harmony security products in the region. Cyber security vendor Orchestra Group has signed its first...
0 wyświetleń0 komentarzy
Stanislaw Banaszak
- 29 mar 2021
- 2 min
Press Release: Aplikacje Krytyczne – Poland selected Harmony IoT by Orchestra Group
Aplikacje Krytyczne deployed Harmony IoT to enhance and strengthen its airspace security and overcome its wireless-born cyberattacks...
0 wyświetleń0 komentarzy
Stanislaw Banaszak
- 23 mar 2021
- 2 min
Risk of Delay
Many organizations have security policies that have an associated time frame. For example a patch policy could be that a patch must be...
1 wyświetlenie0 komentarzy
Stanislaw Banaszak
- 16 mar 2021
- 1 min
Smile – You’re on Camera
Verkada Hack 150,000 security cameras, this time – belonging to Verkada, were exposed in the most recent security breach. This should...
0 wyświetleń0 komentarzy
Stanislaw Banaszak
- 14 mar 2021
- 2 min
Exchange, Solarwinds and Supply Chain Attacks
Another major cyber issue is making the rounds this week – the Microsoft Exchange vulnerabilities published last week. The issue is the...
0 wyświetleń0 komentarzy
Stanislaw Banaszak
- 7 mar 2021
- 2 min
5 Good Practices for Policy based Cyber Risk
A risk management approach is fundamentally different than the standard approach to cyber security. It requires that organizations...
0 wyświetleń0 komentarzy
Stanislaw Banaszak
- 28 lut 2021
- 1 min
…and Cisco Scores a Perfect 10!!
Cisco just published a vulnerability that could allow an unauthenticated, remote attacker to bypass authentication on an affected device....
2 wyświetlenia0 komentarzy
Stanislaw Banaszak
- 21 lut 2021
- 1 min
All the (cyber) World’s a Graph
Graphs are about the connectedness of objects. Graph’s show us correlation and dependence between seemingly random objects as well as the...
1 wyświetlenie0 komentarzy
Stanislaw Banaszak
- 4 gru 2020
- 2 min
DORA the (Threat Led) Explorer
As financial firms become more digital, the EU decided these firms need to focus on ensuring their operations are as cyber resilient as...
0 wyświetleń0 komentarzy
Stanislaw Banaszak
- 25 paź 2020
- 2 min
Security in Numbers
Security (or Safety) in numbers is the hypothesis that, by being part of a large physical group or mass, an individual is less likely to...
1 wyświetlenie0 komentarzy
Stanislaw Banaszak
- 7 wrz 2020
- 1 min
Red, White and Blue Make Purple
Vulnerability scanning, penetration testing and red teams are the main detective controls for residual cyber risk – i.e. the risk that...
0 wyświetleń0 komentarzy
Stanislaw Banaszak
- 26 sie 2020
- 2 min
Red, White and Blue Cybersecurity Risks
Cybersecurity is moving away from using threats, vulnerabilities and exploits as the management metaphor towards risk-based cybersecurity...
1 wyświetlenie0 komentarzy
Stanislaw Banaszak
- 16 lip 2020
- 1 min
Lack of Standard Metrics
Lack of standard metrics to measure, manage and benchmark cyber risk limits security efficiency and effectiveness, making it difficult to...
0 wyświetleń0 komentarzy
Stanislaw Banaszak
- 17 cze 2020
- 2 min
Fragmented technologies
Organizations’ cyber security stack consist of 100-150 different disconnected point tools or technologies making it difficult to assess...
1 wyświetlenie0 komentarzy
Stanislaw Banaszak
- 15 cze 2020
- 1 min
Constantly Shifting Business Needs
In today’s modern world business needs are constantly shifting, IT and cyber risk landscape require a constant stream of attention and...
0 wyświetleń0 komentarzy
Stanislaw Banaszak
- 20 paź 2019
- 2 min
Is Cyber Security Fit-to-Purpose?
ITIL (IT Infrastructure Library) is a set of detailed practices for IT service management (ITSM) that focuses on aligning IT services...
0 wyświetleń0 komentarzy
Stanislaw Banaszak
- 18 paź 2019
- 2 min
Cyber security: Emphasize Protect or Detect?
I am a subscriber to the NIST cyber security framework school of thought. Even though it is officially called the “Framework for...
0 wyświetleń0 komentarzy
Stanislaw Banaszak
- 12 paź 2019
- 2 min
Measuring the Value of Cyber Security
A value-driven approach to cyber security would help businesses understand where to spend their cyber security budget, and how much to...
0 wyświetleń0 komentarzy
Stanislaw Banaszak
- 22 wrz 2019
- 2 min
Visibility, Analytics, Policies and Control are the Lynchpin of Cyber Security
Visibility is context. Analytics combine context with events. Policy translates that into a ”plan of action implemented by controls....
0 wyświetleń0 komentarzy
bottom of page