YOU PLAY LIKE YOU PRACTICE

You Play Like You Practice

If someone asked your IT teams how they would respond to an incident and walk step-by-step through the process, how well do you think they would respond? Would their answers align with the procedures documented in your runbooks or playbooks? If your IT teams were tested via a random, live exercise, how would they perform? […]

HINDSIGHT IS 20/20

HINDSIGHT IS 20 20

Log management is a critical component of any organization’s security posture and should be evaluated regularly as its environment changes. Maximizing logging capabilities provides critical visibility into the events occurring in your company’s environment. System and security logs can often be configured to log capture activity and detail levels. Increased visibility can also translate into […]