Christopher Kozlov: Can Your MDR Service Provider Deliver What You really Need?
“When evaluating an MDR service provider, it’s important to match the provider’s technology and staffing offerings to your technology, usage patterns, and security needs.” All organizations face the challenges of increasing complexity in the technical environment they...
Anatoly Chikanov: Choosing and Working with an MDR Service Provider Involves Risk Management
“For smaller and midsized organizations that do nothave huge security teams to staff a 24/7 SOC, an MDRservice makes sense.” The first step in deciding whether you need a service—and exactly what kind of service you need—is to evaluate your current...
Robert L. Pace: Be Clear in Your Objectives and Transparent with Your MDR Service Provider
“When evaluating an MDR service provider, recognize that the relationship will be more than just monitoring. The provider can take actions, too.” Security is all about how quickly you can detect, identify, isolate, mitigate and remediate issues. To do those things...
Erica Wilson: An MDR Service Provider Must Fit with Your Organization’s Goals
“By having the ability to extend your staff with atrusted partner that can provide additional analytics and faster response times . . . , you are working towarda more mature security program.” In the cybersecurity industry, you can never have enough resources...
Brian Shea: When Considering MDR, Think about What You Need to Accomplish
“An underlying driving force behind MDR is the need to spot threats earlier, respond to them faster, and mitigate them before they become serious incidents.” The big difference between a managed detection and response (MDR) service and traditional security...
GoSecure: 7 Experts on Transitioning to Managed Detection and Response
The book includes insights from the following experts: Brian Shea, Revolution Group, Chief Information Officer and Practice Director, Technical Services, Read the article here >> Erica Wilson, Cass Information Systems, Vice President, Chief Information Security...
Kamaljit Singh: IoT Security Begins with Secure Boot
“If you don’t have a secure boot mechanism inside that device, then every other security measure will fail. There is no use having any security on the device if you don’t have secure boot.” To design secure Internet of Things (IoT) devices, engineers must consider the...
Thomas Mosel: IoT Solution Security Must Be a Product Life-Cycle Consideration
“If somebody compromises an office building climate system to change the temperature, that is inconvenient. If someone increases temperatures in a hospital, that could kill people.” Thomas Mosel, Principle Product and Solution Security Officer for smart infrastructure...
Mohan Kulkarni: When Designing Secure Devices, Don’t Forget the Supply Chain
“Hardware and data protection are critical areas from a technical risk perspective.” Mohan Kulkarni, Product Manager at PMD Solutions, stresses that device security must be considered at the earliest stages of the Internet of Things (IoT) design and engineering...
Jonathan Cartrette: Hardware Authentication Is the Foundation of a Secure IoT Ecosystem
“It is impossible to do a good job of protecting firmware integrity if you do not have hardware you can trust.” Internet of Things (IoT) security begins with hardware authentication. “You’ve got to sign the hardware if you are going to have ecosystem-level rights...