Security Operations Center (SOC) Octava Defence переходить до системного інтегратора Accord Group

«Я переорієнтовую Octava Defence виключно на defence-tech рішення для нашої країни та світу, залишаючи все, що стосується Cyber, в зоні відповідальності таких потужних ІТ-команд як Accord Group», – коментує рішення засновник Octava Defence, голова наглядової ради “Октава Капітал” Олександр Кардаков. Важливо зазначити, що SOC не є стартапом і не починає свою діяльність з нуля. Він […]

Octava Defence presented its developments at the ASIS EUROPE 2024 conference

Octava Defence, a company of Octava Capital Group, became the first Ukrainian company to present its technological and software solutions to the global security community at the ASIS Europe conference in Vienna. It is a unified platform for the protection of critical infrastructure “SPHERE”, which combines the functionality of the radar control system, intelligent video […]

Defensible Networks

The term Defensible Network Architecture (DNA), was first introduced by cybersecurity expert Richard Bejtlich in 2004 in his book The Tao of Network Security Monitoring. Richard Bejtlich is a graduate of the US Air Force Academy and has held the positions of Chief Security Officer at FireEye, Chief Security Officer at Mandiant, and worked at […]

11 SOC strategies from MITRE. Roadmap for thoughtful work of Ukrainian CISOs

The latest research shows that more than half of all existing cyber security incident response centres are considered ineffective in the opinion of their owners. Organisations lack the expertise to properly build a SOC or analyse current assets and make adjustments in line with goals. MITRE has developed a practical guide of 11 strategies, which […]

How to measure the reliability of a cyber security system

Oleksii Sevonkin, BDM at Octava Defence, will help you understand the skills that a system must have to be considered cyber-resilient and get clear criteria for determining the reliability of your business’s cyber security system. It is no secret that the new reality has led to a radical increase in the risk of cyberattacks. Quarantine […]

8 signs of a reliable cyber security partner that CISOs rely on

Cyber security managers around the world are changing the way they operate, looking towards a more mature cyber security landscape. Their relentless adversaries support this movement with obsessive attempts to cross the edge and exploit the data. Companies are adapting their tactics, technological equipment and procedures with the help of managed service providers, who, amid […]