Cookie-cutter approaches do not work in Information Security. The economy of scale yields a lack of security, in our opinion. Though we do bring extensive templates, lexicons, and tuning processes to a managed services engagement, we take great pride in our ability to customize our detection and response methods to your unique needs. Our decision trees, calling trees, and response methodologies will be customized to your unique situation. Meanwhile, we can write signatures for any situation you can imagine. As founders of bleedingsnort.com, we have been writing signatures since 2003. Ask our existing Clients if they think we take a “generic” approach to security!
Leave a comment
An update to ‘Cottage Please’ . . . Another one of those Dan’s New Leaf Posts, meant Read more
The Council’s members met last week to discuss their response to the growing crisis… Read more
Another awareness poster for YOUR customers (and users). Now that we have our own em Read more
As more offices rely on working remotely, hackers are working to take advantage… An a Read more