05.12.202314.03.2024 Defensible Networks The term Defensible Network Architecture (DNA), was first introduced by cybersecurity expert Richard Bejtlich in 2004 in his book The Tao of… Докладніше
05.12.202314.03.2024 11 SOC strategies from MITRE. Roadmap for thoughtful work of Ukrainian CISOs The latest research shows that more than half of all existing cyber security incident response centres are considered ineffective in the opinion… Докладніше
05.12.202314.03.2024 How to measure the reliability of a cyber security system Oleksii Sevonkin, BDM at Octava Defence, will help you understand the skills that a system must have to be considered cyber-resilient and… Докладніше
05.12.202314.03.2024 8 signs of a reliable cyber security partner that CISOs rely on Cyber security managers around the world are changing the way they operate, looking towards a more mature cyber security landscape. Their relentless… Докладніше
05.12.202314.03.2024 Cyber resilience of a large business Oleksandr Atamanenko, CISO of Octava Group, about cyber security strategy for holding structures and the role of SOC in its implementation.Being in… Докладніше
05.12.202314.03.2024 Why are technical protections not enough to ensure cyber security? There are 5 reasons, why you CANNOT rely on technology alone to ensure cyber security.1. The cybercrime economy is evolving, which means… Докладніше
05.12.202314.03.2024 David versus Goliath: How MSSP beats the traditional cyber security solution delivery model No matter what kind of IT and cyber security budget you have, most likely, you, like most, are trying to close cyber… Докладніше
05.12.202314.03.2024 How SOC helps implement Cyber security Mesh The rapid evolution and increasing sophistication of cyberattacks, along with the widespread migration of assets to hybrid multi-cloud infrastructures, create a host… Докладніше