Blogs

Blog Image

IOCs vs TTPs

Definitions:

An IOC (Indicator of Compromise) and a TTP (Tactics, Techniques, and Procedures) are two different types of cybersecurity indicators that organizations use to detect and respond to cyber threats.

Blog Image

A Brief Discussion on Cyber Threat Intelligence Framework

There are many different cyber threat intelligence frameworks available, and the best one for you will depend on your specific needs and resources. Some popular frameworks include:

Blog Image

Five Reasons Why Your Organization Needs a Managed SIEM Solution 

Security Information and Event Management (SIEM): A Quick History 

Back in 2005, the first generation of Security Information and Event Management (SIEM) platforms was a pretty big deal. These platforms combined security event management with security information for the first time, bringing the data security industry into a new era. (cybersecurity-magazine.com

Blog Image

Warning: Cybercriminals Use Phishing Scams Following Syria-Turkey Tragedy

Following the recent earthquakes in Syria-Turkey, security experts have warned of phishing scams launched by cybercriminals to deceive people into donating to fake causes. These scams take advantage of people's generosity and willingness to help those affected by the disaster. They may come in the form of emails or social media messages that appear to be from legitimate charities or relief organizations, but in reality, are fake.

Blog Image

Merging Disparate Security Controls: Finding Your Perfect MDR Match

There is a lot of pressure out there in a busy cybersecurity world, and you’ve been dealing with lonely, disparate security controls. There’s pressure to reduce time to detect and response. Challenges around configuration, deployment, and maintenance of tools. And so many apps and online profiles to sort through to see what the best cybersecurity solutions have to offer. Let’s face it. When it comes to searching for your perfect Managed Detection and Response (MDR) match – you're (alert) fatigued.

Blog Image

Uncover More Attacks Faster with the New Vision One Platform: A Trend Micro Partnership

One of our core tenants since launching MDR services at Critical Start has always been that we don’t build “threat detection” products. There are a massive number of security vendors in the marketplace, and we’ve always believed it would be foolish to think that we could out-innovate all of them to provide a more effective threat detection tool.

Blog Image

Three Steps to Increase Employee Data Privacy 

Every day, your data is collected. Whether it’s on your laptop, smart phone, or even your fitness watch, your data is being stored and potentially sold. Thankfully, we do have some control over how our data is captured and shared. Data Privacy Week, promoted by the National Cybersecurity Alliance, is January 22nd – 28th, 2023.

Blog Image

Seven Questions for Critical Start's New CISO

George Jones, Critical Start’s new CISO (Chief Information Security Officer), wears Hawaiian shirts on Thursdays. He cheers for the Red Sox, hits the gym every day at 5:30am, and was originally born in Germany when his dad served with the United States Army. 

Blog Image

New Year, New Cyber Resolutions (and Same Phishing Techniques)

The recent holiday season brought an uptick in well-crafted, targeted phishing attacks. In 2021, the industry saw a 30% increase in ransomware attacks during the holidays, and a 70% increase in attempted ransomware attacks (MUO) during November and December.