

Empowering Our Global Channel to Grow Their IR Business - Part 2 of 2
As our industry faces a huge demand for security experts and knowledge, today’s information security practitioners have struggled to keep up with the sophistication of cyberattacks and growing technological complexities. Customers tell us they need help – a demand for in-depth guidance on maturing threat detection and response capabilities. The current available resources tend to focus on fundamentals and lack the answers needed by organizations facing real world challenges.
Read ArticleNeil Batstone, VP of Global Alliances & Channel, sat down with Judy Kaneko, Director of Corporate Communications, to discuss Resolution1 Security’s global channel and alliance program for 2015.
Read ArticleNeil Batstone, VP of Global Alliances & Channel, sat down with Judy Kaneko, Director of Corporate Communications, to discuss Resolution1 Security’s global channel and alliance program for 2015.
Read ArticleSince incident response is generally an after-thought to most companies and not well understood, the level of concern that this time frame has generated is understandable. In contrast, I believe the 30-day window, while a step in the right direction, will drive the wrong behaviors. What Obama’s proposed legislation should address is the rapid detection and response of cyber intrusions on networks. I would propose three alternatives...
Read ArticleThis blog is not intended to be a political commentary, but rather the perspective of someone who has been responding to incidents for years, as well as a previous member of the public-private sharing organization known as the Defense Industrial Base.
Read ArticleThe new release of Resolution1 Cybersecurity 5.6 offers a number of fantastic resources, products and services to help you take back control features including the ability to track and report on incidents with key performance metrics, monitor mobile devices, Manage threat feeds no matter where you are plus much more!
Read ArticleAs an incident responder leader building IR operations from the ground up for major companies, I recognize that you are only as strong as the community you operate in, and how effectively your incident responders are able to leverage their investments. Our Resolution1 Customer Enablement Portal is a commitment to our customers that we are here to help make them successful.
Read ArticleWe recently made a community freeware tool, ThreatScanner, available to help security professionals determine if a suspected endpoint has been compromised by the Regin or the destructive Sony malware. As a result, we received a number of questions about what to do if an organization had a positive hit. So I’ve compiled a list of five things to do and not to do if you think ThreatScanner results point to a Sony malware (aka WIPALL) or Regin compromise.
Read ArticleMajor Information Security themes for 2015: be prepared and responsive to the major attacks their organizations face. To us, it’s about maximizing our customers’ current cybersecurity investments, and expanding their ability to proactively detect and respond- as opposed to waiting for the inevitable to happen. As we’ve continued to see, times have changed and CISO’s and their teams are expected to do considerably more now.
Read ArticleIt should come as no surprise to security industry veterans that there are bad guys out there…whether they are state-sponsored, cybercriminals for profit or hacktivists. As it relates to the Sony Pictures breach, we are certainly surprised about the North Korea involvement for two reasons:
Read Article