Robert L. Pace: Be Clear in Your Objectives and Transparent with Your MDR Service Provider
“When evaluating an MDR service provider, recognize that the relationship will be more than just monitoring. The provider can take actions, too.” Security is all about how quickly you can detect, identify, isolate, mitigate and remediate issues. To do those things...
Erica Wilson: An MDR Service Provider Must Fit with Your Organization’s Goals
“By having the ability to extend your staff with atrusted partner that can provide additional analytics and faster response times . . . , you are working towarda more mature security program.” In the cybersecurity industry, you can never have enough resources...
Brian Shea: When Considering MDR, Think about What You Need to Accomplish
“An underlying driving force behind MDR is the need to spot threats earlier, respond to them faster, and mitigate them before they become serious incidents.” The big difference between a managed detection and response (MDR) service and traditional security...
GoSecure: 7 Experts on Transitioning to Managed Detection and Response
The book includes insights from the following experts: Brian Shea, Revolution Group, Chief Information Officer and Practice Director, Technical Services, Read the article here >> Erica Wilson, Cass Information Systems, Vice President, Chief Information Security...
Kamaljit Singh: IoT Security Begins with Secure Boot
“If you don’t have a secure boot mechanism inside that device, then every other security measure will fail. There is no use having any security on the device if you don’t have secure boot.” To design secure Internet of Things (IoT) devices, engineers must consider the...
Thomas Mosel: IoT Solution Security Must Be a Product Life-Cycle Consideration
“If somebody compromises an office building climate system to change the temperature, that is inconvenient. If someone increases temperatures in a hospital, that could kill people.” Thomas Mosel, Principle Product and Solution Security Officer for smart infrastructure...
Mohan Kulkarni: When Designing Secure Devices, Don’t Forget the Supply Chain
“Hardware and data protection are critical areas from a technical risk perspective.” Mohan Kulkarni, Product Manager at PMD Solutions, stresses that device security must be considered at the earliest stages of the Internet of Things (IoT) design and engineering...
Jonathan Cartrette: Hardware Authentication Is the Foundation of a Secure IoT Ecosystem
“It is impossible to do a good job of protecting firmware integrity if you do not have hardware you can trust.” Internet of Things (IoT) security begins with hardware authentication. “You’ve got to sign the hardware if you are going to have ecosystem-level rights...
Ivan Fumagalli: IoT Solution Security Must Be a Product Life-Cycle Consideration
“Using the currently available version of the software is important, which means staying in touch with chip and operating system builders.” When building an [Internet of Things] IoT solution, you can’t always use the best security because the market will not pay for...
Debasis Bisoi: To Build Secure IoT Devices, Security Can’t Be an Afterthought
“When you do something as an afterthought, it becomes extremely difficult to bake it back into the design.” Building security into Internet of Things (IoT) devices has become a primary design consideration because of the changing nature of these devices. Debasis...