Blog
Colonial Pipeline Ransomware Attack: Lessons For SOC Operators
Background Earlier this month, Colonial Pipeline — the largest pipeline system for refined oil production in the U.S. — suffered a ransomware attack that resulted in the closure of one of the largest U.S. pipelines. As a result of the attack, the pipeline operator was forced to temporarily halt all pipeline operations resulting in massive…
-
13 Questions to ask your SOC provider
As cyber-attacks have become more frequent and complex, there has been a surge in the number of Security Operations Center SOC platforms specializing in threat hunting and incident response. The SOC market is projected to grow from $471 million in 2020 to $1.656 billion by 2025, at a compound annual growth rate of 28.6% during…
-
Colonial Pipeline Ransomware Attack: Lessons For SOC Operators
Background Earlier this month, Colonial Pipeline — the largest pipeline system for refined oil production in the U.S. — suffered a ransomware attack that resulted in the closure of one of the largest U.S. pipelines. As a result of the attack, the pipeline operator was forced to temporarily halt all pipeline operations resulting in massive…
-
Cybersecurity Isn’t Enough: You Need A Human Intelligence Team
Cybersecurity threats are growing in number and sophistication every year. Since 2017, the industry has seen a year-over-year increase of 27%, with hundreds of millions of attacks occurring every day in 2020. As we saw with the SolarWinds attack and the recent attack on US fuel pipeline operator Colonial Pipeline, even the best cyber defenses implemented by…
-
What Is a SOC Platform and How It Can Help IT Professionals to Excel in Their Job
Will your company survive if there is a breach of its data infrastructure? According to a prediction by Cybersecurity Ventures, businesses around the world are more likely to fall victim to ransome attacks every 11 seconds in 2021, compared to 14 seconds in 2019. In todays’ business landscape, a single data breach can cause a…
-
Two Emerging Vector Trends
Life is never dull for cybersecurity teams, but we’ve seen an increase in two types of threat vectors during the first half of 2021. Reports of the recent Codecov Bash Uploaded security breach is an example of a supply chain attack, while common vulnerabilities and exposures (CVE) have shown up in increased frequency at Apple,…
-
Why Software Supply Chain Attacks are a CEO’s Nightmare
Recent supply chain attacks such as SolarWinds and Mimecast have shown that these types of attacks are definitely on the increase for enterprises. You might think that as a small to medium business (SMB), you have less to worry about compared to an enterprise. But SMBs have just as much – if not more – to worry about…