Pankaj SinghforPankaj's Blogpankaj007.hashnode.net·Apr 7, 2023Using data science to improve incident response timesIntroduction Incident response time is critical in preventing cyber attacks from causing significant damage. The faster an organization can identify and respond to a security incident, the less likely it is that the attack will have severe consequenc...Discuss·10 likesincident response
Zach WingoforThe Sentinelwingo.hashnode.net·Jan 13, 2022Respond Function of the NIST Cybersecurity FrameworkIntroduction Now that we have discussed the Identify, Protect, and Detect functions, it's time to focus on the Respond function. The Respond Function is all about what to do when a cybersecurity incident happens. The goal of the Respond function is t...Discuss#cybersecurity
Adam ChemironforAdam Chemironadamchemiron.hashnode.net·Jul 9, 2022Developing an Incident Response Plan for your Organization"Every incident starts as an event, but not all events become incidents" The gravity of that statement rings true to any incident response team that has had to deal with numerous events that, on the surface, seem to be an incident but turn out to be ...Discuss·74 readsincident response
Pankaj SinghforPankaj's Blogpankaj007.hashnode.net·Apr 7, 2023Using data science to improve incident response timesIntroduction Incident response time is critical in preventing cyber attacks from causing significant damage. The faster an organization can identify and respond to a security incident, the less likely it is that the attack will have severe consequenc...Discuss·10 likesincident response
Dwayne McDanielforGitGuardiangitguardian.hashnode.net·Apr 5, 2023Remediating Incidents With The GitGuardian API [cheat sheet included]Download the API Cheat Sheet When a hardcoded secret is detected in your source code, you can rely on GitGuardian to help you prioritize, investigate, and remediate the incident. When you think of the GitGuardian platform, most people picture the das...DiscussAPIs
Dwayne McDanielforGitGuardiangitguardian.hashnode.net·Feb 24, 2023Intrusion Detection Through Cyber Deception: Disrupting Attacks With An Active DefenseWe should do our best to ensure our network and pipeline perimeters are secure and make it hard for attackers to gain access. However, the reality is that intruders will stop at nothing to gain access, as evidenced by the Uber, CircleCI, and Dropbox ...DiscussHoneypot
Ahmed El TaweelforRandom Thoughts and moreahmedeltaweel.hashnode.net·Feb 5, 2023Incident management, What, Why and How?What Incident management in software refers to the process of identifying, responding to, and resolving unexpected events or failures that occur within a software system. These incidents can range from minor issues, such as a slow page load, to major...Discuss·120 readsSRE
Adam ChemironforAdam Chemironadamchemiron.hashnode.net·Jan 30, 2023MSDT Follina Vulnerability Exploitation and DetectionIntroduction As an Incident Responder, dealing with a zero-day exploit in your IT environment is one of those things you would not wish on your worst enemy. First disclosed in May 2021, the Follina exploit is a remote code execution (RCE) vulnerabili...Discuss·43 readsincident response
Jean-Mark WrightforPerspective Unspokenjaywhy13.hashnode.net·Dec 13, 2022Can a good explanation really prevent a prod incident?A missed opportunity to communicate It was March 21, 2022. I remember the day like yesterday. I just started my On-Call Shift. Our team On-Call rotation is set up so each engineer goes on call for a week, once every 6 or so weeks. The On-Call Enginee...Discuss·921 readscommit
Preston GlevosforSOCVaultsocvault.hashnode.net·Jul 29, 2022Importance Of Incident ResponseOrganizations across all areas understand the significance of utilizing innovation to attract clients. In any case, with a mechanical mix, new network protection dangers are arising consistently, jeopardizing portable informing applications, web-base...Discuss·28 readsincident response
Adam ChemironforAdam Chemironadamchemiron.hashnode.net·Jul 9, 2022Developing an Incident Response Plan for your Organization"Every incident starts as an event, but not all events become incidents" The gravity of that statement rings true to any incident response team that has had to deal with numerous events that, on the surface, seem to be an incident but turn out to be ...Discuss·74 readsincident response
Asutosh PandaforAsutosh Panda's Blogmeasutosh.hashnode.net·Jul 5, 2022Bot for Incident ManagementDuring incidents you loose money every second(amazon looses almost 220k per minute). At many companies the incident handling system is mostly manual and no doubt error-prone. So question arises can we make it managed by a bot. The answer is yes and w...Discuss·58 readsincident response
Zach WingoforThe Sentinelwingo.hashnode.net·Jan 13, 2022Respond Function of the NIST Cybersecurity FrameworkIntroduction Now that we have discussed the Identify, Protect, and Detect functions, it's time to focus on the Respond function. The Respond Function is all about what to do when a cybersecurity incident happens. The goal of the Respond function is t...Discuss#cybersecurity