Cookie-cutter approaches do not work in Information Security. The economy of scale yields a lack of security, in our opinion. Though we do bring extensive templates, lexicons, and tuning processes to a managed services engagement, we take great pride in our ability to customize our detection and response methods to your unique needs. Our decision trees, calling trees, and response methodologies will be customized to your unique situation. Meanwhile, we can write signatures for any situation you can imagine. As founders of bleedingsnort.com, we have been writing signatures since 2003. Ask our existing Clients if they think we take a “generic” approach to security!
Leave a comment
We have recently made a significant change to our Incident Response Policy regarding Read more
Even if you haven’t ever used Facebook, your friends and family may have already let Read more
Just in time for the next round of SOC reviews, we’ve reviewed and updated our metric Read more
Another awareness poster for YOUR customers (and users). Now that we have our own em Read more