Cookie-cutter approaches do not work in Information Security. The economy of scale yields a lack of security, in our opinion. Though we do bring extensive templates, lexicons, and tuning processes to a managed services engagement, we take great pride in our ability to customize our detection and response methods to your unique needs. Our decision trees, calling trees, and response methodologies will be customized to your unique situation. Meanwhile, we can write signatures for any situation you can imagine. As founders of bleedingsnort.com, we have been writing signatures since 2003. Ask our existing Clients if they think we take a “generic” approach to security!
Leave a comment
For the first time, a data breach has triggered a financial downgrade… An article rev Read more
Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governan Read more
A new generation of interns may open organizations up to new risks… An article review Read more
Another awareness poster for YOUR customers (and users). Now that we have our own em Read more
Years after patches were released, many systems remain vulnerable… An article review. Read more