3 Steps to Build the Ideal Incident Response Framework

Posted by Fuel HQ on May 29, 2018 3:19:34 PM

Tuesday, May 29, 2018

coaching-coders-coding-7374

It’s one thing to know you need an incident response strategy, and another to build such a plan. It can seem like a daunting task, but with a few key steps in place, you’ll be able to outline what your incident response framework will look like and how it will function.

  

Read More

Topics: incident response, cybersecurity protocol, incident response framework, threat preparation, threat prevention, threat detection, detection and analysis

Incident Response Framework: A Three-Part Gut Check

Posted by Fuel HQ on May 15, 2018 9:33:34 AM

Tuesday, May 15, 2018

Incident Response FrameworkSecurity incidents are inevitable. While there are different methods for dealing with such threats, one of the easiest things to do is simply have a plan in place for when things do go wrong. This is why, to appropriately respond and survive a security incident, organizations should have a solid incident response framework.

 

 

Read More

Topics: incident response, cybersecurity protocol, incident response framework, threat preparation, threat prevention, threat detection, detection and analysis

Six Tips to Ensure Multi-Cloud Protection

Posted by Fuel HQ on Feb 4, 2018 1:40:02 PM

Sunday, February 4, 2018

What is your multi-cloud strategy? Today it is not uncommon for organizations to be running a mix of public infrastructure as a service (IaaS) environments, such as Amazon Web Services and Microsoft Azure. In fact, a recent study concluded that one-third of the world’s companies are using four or more cloud vendors in their day-to-day operations.

Read More

Topics: Cybersecurity, Palo Alto Networks, strategies for security, cybersecurity tools, security tools, cybersecurity protocol, Cloud Security Management

Why Volunteering Works: Four Compelling Reasons

Posted by Fuel HQ on Jan 26, 2018 1:35:00 PM

Friday, January 26, 2018

The act of volunteering—helping your neighbors without recompense—offers more than just a helping hand, it benefits you and those you help in different ways. And there are many ways in which you can volunteer—whether related to your career via professional user group or something completely unrelated.

Read More

Topics: Cybersecurity, Palo Alto Networks, strategies for security, cybersecurity protocol, Fuel Volunteers

Developing a Cybersecurity Protocol

Posted by Fuel HQ on Jan 24, 2018 4:05:26 PM

Wednesday, January 24, 2018

Cybersecurity threats come at a rapid pace these days—or so it seems. That leaves security professionals with very little room for error and the need to eliminate uncertainty in the process.

Here’s where protocol becomes your best friend; a clear progression of steps to take in the face of an immediate threat. Better yet, Fuel volunteer Paul Carter asks, can that protocol be standardized across organizations? He believes so and, in response, developed the DDIVE Model –which stands for Detect, Design, Implement, Validate, Establish. A security-focused response to incidents that will ensure viable options are considered, implemented and documented, DDIVE is designed to be adaptable and repeatable.

Read More

Topics: Cybersecurity, Palo Alto Networks, strategies for security, cybersecurity tools, security tools, cybersecurity protocol, Fuel Volunteers, standardization

Posts by Topic

see all

Subscribe to Blog Updates

Recent Posts

Posts by Topic

see all