mstdn.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A general-purpose Mastodon server with a 500 character limit. All languages are welcome.

Administered by:

Server stats:

16K
active users

#mssp

0 posts0 participants0 posts today
LimaCharlie<p>Is your MSSP struggling to grow while your EDR vendor targets your customers with their MDR services?</p><p>Join Maxime Lamothe-Brassard TODAY at 10:00AM PST / 1:00PM EST to discover how to respond faster, scale efficiently, and increase profitability with practical solutions for:</p><p>&gt; Deploying in minutes during emergency incidents<br>&gt; Maintaining consistent security with Git integration<br>&gt; Unifying visibility across multiple data sources<br>&gt; Creating new revenue streams without retraining staff</p><p>Register now: <a href="https://limacharlie.wistia.com/live/events/dg797y08lv?utm_campaign=Outreach&amp;utm_source=Mastodon&amp;utm_medium=Social" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">limacharlie.wistia.com/live/ev</span><span class="invisible">ents/dg797y08lv?utm_campaign=Outreach&amp;utm_source=Mastodon&amp;utm_medium=Social</span></a></p><p><a href="https://infosec.exchange/tags/mssp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mssp</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
secsolution<p>La cyber resilienza secondo la normativa DORA: di Denis Valter Cassinerio - Senior Director &amp; General Manager South EMEA Acronis La resilienza informatica continua a essere al centro dell'attenzione nel settore della cybersecurity. L'obiettivo della migliore implementazione all'interno delle aziende e' infatti una parte centrale anche della normativa...<br><a href="https://mastodon.social/tags/DenisValterCassinerio" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DenisValterCassinerio</span></a> <a href="https://mastodon.social/tags/EMEA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EMEA</span></a> <a href="https://mastodon.social/tags/Acronis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Acronis</span></a> <a href="https://mastodon.social/tags/regolamentoDORA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>regolamentoDORA</span></a> <a href="https://mastodon.social/tags/MSSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSSP</span></a> <a href="http://dlvr.it/TJlysd" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">http://</span><span class="">dlvr.it/TJlysd</span><span class="invisible"></span></a></p>
Habr<p>Руководство по выбору SOC: на что обратить внимание</p><p>Привет! Меня зовут Михаил Климов, я руководитель команды SOC в компании RED Security. Хочу поговорить про выбор SOC (Security Operation Center) — центра реагирования на инциденты информационной безопасности (ИБ). Вопрос актуален как никогда: в последнее время половина ленты Хабра посвящена кибератакам на бизнес, приняты законы, ужесточающие ответственность компаний за утечку персональных данных. Из-за этого многие директора по информационной безопасности обращаются к вопросу о создании процессов мониторинга событий ИБ в инфраструктуре и максимально быстрого реагирования на возможные кибератаки. Но как выбрать тот самый SOC и определиться с моделью поставок — отдельный вопрос. Я часто сталкиваюсь с тем, что компании начинают строить внутренний центр мониторинга, тратят около года на проект, и все это время защищенность остается на прежнем неудовлетворительном уровне. Затем они понимают, что самостоятельно его реализовать сейчас не могут, и в итоге обращаются к аутсорсингу. И напротив, поработав несколько лет с внешними поставщиками сервисов SOC, переходят к созданию внутреннего центра мониторинга. Как же понять оптимальный вариант поставки для конкретной компании на определенном этапе, чтобы не потратить время и ресурсы впустую, двигаясь методом проб и ошибок? Что правильнее: строить собственный центр реагирования или выбрать одно из готовых решений от многочисленных аутсорсинговых сервис-провайдеров? В этом посте я и мой коллега Ильназ Гатауллин, технический руководитель RED Security SOC, разобрали варианты организации SOC исходя из потребностей и ресурсов бизнеса.</p><p><a href="https://habr.com/ru/companies/ru_mts/articles/889196/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">habr.com/ru/companies/ru_mts/a</span><span class="invisible">rticles/889196/</span></a></p><p><a href="https://zhub.link/tags/%D0%B8%D0%BD%D1%84%D0%BE%D1%80%D0%BC%D0%B0%D1%86%D0%B8%D0%BE%D0%BD%D0%BD%D0%B0%D1%8F_%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>информационная_безопасность</span></a> <a href="https://zhub.link/tags/SOC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SOC</span></a> <a href="https://zhub.link/tags/SIEM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIEM</span></a> <a href="https://zhub.link/tags/threat_intelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threat_intelligence</span></a> <a href="https://zhub.link/tags/mssp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mssp</span></a> <a href="https://zhub.link/tags/%D0%BA%D0%B8%D0%B1%D0%B5%D1%80%D0%B0%D1%82%D0%B0%D0%BA%D0%B8" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>кибератаки</span></a> <a href="https://zhub.link/tags/%D0%BC%D0%BE%D0%BD%D0%B8%D1%82%D0%BE%D1%80%D0%B8%D0%BD%D0%B3_%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D0%B8" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>мониторинг_безопасности</span></a> <a href="https://zhub.link/tags/%D1%80%D0%B5%D0%B0%D0%B3%D0%B8%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5_%D0%BD%D0%B0_%D0%B8%D0%BD%D1%86%D0%B8%D0%B4%D0%B5%D0%BD%D1%82%D1%8B" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>реагирование_на_инциденты</span></a> <a href="https://zhub.link/tags/%D0%B0%D0%BD%D0%B0%D0%BB%D0%B8%D0%B7_%D0%BB%D0%BE%D0%B3%D0%BE%D0%B2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>анализ_логов</span></a> <a href="https://zhub.link/tags/%D0%B7%D0%B0%D1%89%D0%B8%D1%82%D0%B0_%D0%B8%D0%BD%D1%84%D1%80%D0%B0%D1%81%D1%82%D1%80%D1%83%D0%BA%D1%82%D1%83%D1%80%D1%8B" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>защита_инфраструктуры</span></a></p>
Pyrzout :vm:<p>48 Hours in the Trenches: The High-Stakes World of Incident Response – Source: securityboulevard.com <a href="https://ciso2ciso.com/48-hours-in-the-trenches-the-high-stakes-world-of-incident-response-source-securityboulevard-com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/48-hours-in-the-</span><span class="invisible">trenches-the-high-stakes-world-of-incident-response-source-securityboulevard-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/SecurityBloggersNetwork" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityBloggersNetwork</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/SecurityBoulevard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityBoulevard</span></a> <a href="https://social.skynetcloud.site/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentResponse</span></a> <a href="https://social.skynetcloud.site/tags/Blog" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Blog</span></a> <a href="https://social.skynetcloud.site/tags/MSSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSSP</span></a></p>
Games Japan<p><a href="https://www.wacoca.com/games/1060967/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="">wacoca.com/games/1060967/</span><span class="invisible"></span></a> 【ロケットリーグ】伝説の始まりと共に車と喉が壊れる音がする健康ロケリ 【<a href="https://wakoka.com/tags/%E3%82%89%E3%81%A3%E3%81%A0%E3%81%81%E5%88%87%E3%82%8A%E6%8A%9C%E3%81%8D" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>らっだぁ切り抜き</span></a>】 #<a href="https://wakoka.com/tags/%E3%83%9E%E3%82%A4%E3%82%AF%E3%83%A9" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>マイクラ</span></a> <a href="https://wakoka.com/tags/Game" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Game</span></a> <a href="https://wakoka.com/tags/Minecraft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Minecraft</span></a> <a href="https://wakoka.com/tags/MSSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSSP</span></a> <a href="https://wakoka.com/tags/PS4GAMES" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PS4GAMES</span></a> <a href="https://wakoka.com/tags/%E3%81%88%E3%81%8A%E3%81%88%E3%81%8A" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>えおえお</span></a> <a href="https://wakoka.com/tags/%E3%81%90%E3%81%A1%E3%81%A4%E3%81%BC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ぐちつぼ</span></a> <a href="https://wakoka.com/tags/%E3%82%B2%E3%83%BC%E3%83%A0" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ゲーム</span></a> <a href="https://wakoka.com/tags/%E3%82%B9%E3%83%9E%E3%82%A4%E3%83%AB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>スマイル</span></a> <a href="https://wakoka.com/tags/%E3%81%A1%E3%83%BC%E3%81%AE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ちーの</span></a> <a href="https://wakoka.com/tags/%E3%81%B4%E3%81%8F%E3%81%A8" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ぴくと</span></a> <a href="https://wakoka.com/tags/%E3%83%9B%E3%83%A9%E3%83%BC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ホラー</span></a> <a href="https://wakoka.com/tags/%E3%83%9B%E3%83%A9%E3%82%B2%E3%83%BC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ホラゲー</span></a> <a href="https://wakoka.com/tags/%E3%83%9E%E3%82%A4%E3%83%B3%E3%82%AF%E3%83%A9%E3%83%95%E3%83%88" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>マインクラフト</span></a> <a href="https://wakoka.com/tags/%E3%81%BE%E3%81%98%E3%83%A4%E3%83%90" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>まじヤバ</span></a> <a href="https://wakoka.com/tags/%E3%82%89%E3%81%A3%E3%81%A0%E3%81%81" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>らっだぁ</span></a> <a href="https://wakoka.com/tags/%E3%82%89%E3%81%A3%E3%81%A0%E3%81%81%E5%88%87%E3%82%8A%E6%8A%9C%E3%81%8D" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>らっだぁ切り抜き</span></a> <a href="https://wakoka.com/tags/%E3%83%AD%E3%82%B1%E3%83%83%E3%83%88%E3%83%AA%E3%83%BC%E3%82%B0" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ロケットリーグ</span></a> <a href="https://wakoka.com/tags/%E5%88%87%E3%82%8A%E6%8A%9C%E3%81%8D" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>切り抜き</span></a> <a href="https://wakoka.com/tags/%E5%AE%9F%E6%B3%81" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>実況</span></a> <a href="https://wakoka.com/tags/%E7%9B%9B%E3%82%8A%E5%90%88%E3%82%8F%E3%81%9B" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>盛り合わせ</span></a> <a href="https://wakoka.com/tags/%E9%85%8D%E4%BF%A1" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>配信</span></a> <a href="https://wakoka.com/tags/%E9%AC%B1%E5%85%88%E7%94%9F" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>鬱先生</span></a></p>
ThirdTier Amy<p><a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/msp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>msp</span></a> <a href="https://infosec.exchange/tags/mssp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mssp</span></a> <a href="https://infosec.exchange/tags/itsp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>itsp</span></a> <a href="https://infosec.exchange/tags/fightingcybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fightingcybercrime</span></a><br><a href="https://bit.ly/3uANmzZ" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/3uANmzZ</span><span class="invisible"></span></a></p>
ThirdTier Amy<p><a href="https://infosec.exchange/tags/MSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSP</span></a> <a href="https://infosec.exchange/tags/MSSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSSP</span></a> <a href="https://infosec.exchange/tags/ITSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITSP</span></a> <a href="https://infosec.exchange/tags/fightingcybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fightingcybercrime</span></a><br><a href="https://bit.ly/3T7s8Dm" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/3T7s8Dm</span><span class="invisible"></span></a></p>
Patrick Townsend<p>Heads up, InfoSec friends in the US - HIPAA<br>&nbsp;</p><p>It is hard to believe that the HIPAA rule was passed almost 30 years ago. And, to me, it is surprising that the folks at HHS/OCR are just now getting around to correcting one fundamental mistake in the security rules. If you follow this regulatory area, you know that some of the security rules are mandatory and some of them are “addressable”. What does addressable mean? It means you *should* do it, but you don’t have to. In the security world we know what that means. If you don’t have to do it, you probably won’t. And that’s exactly what happened – health care data breaches have just increased over time. Recently we saw the massive Change Healthcare breach with about 100 million (!) records lost.<br>&nbsp;<br>HHS/OCR is now planning on an update to HIPAA security rules related to encryption and some other areas. This Notice of Proposed Rulemaking (NPRM) just arrived in my inbox this week:<br>&nbsp;<br><a href="https://www.hhs.gov/hipaa/for-professionals/security/hipaa-security-rule-nprm/factsheet/index.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">hhs.gov/hipaa/for-professional</span><span class="invisible">s/security/hipaa-security-rule-nprm/factsheet/index.html</span></a><br>&nbsp;<br>It takes time for this to work through the bureaucratic process, but given the history of losses of Protected Health Information (PHI and ePHI), I think this will eventually become the rule. Notice that the distinction between “mandatory” and “addressable” is going away. Also notice the focus on encryption of data at rest.<br>&nbsp;<br>Most health organizations (Covered Entities and Business Associates in HIPAA lingo) have done work to encrypt laptops but that is not where the juicy stuff resides. It’s in those big medical application databases. So, this will be a big change.<br>&nbsp;<br>If you provide IT and/or security expertise to an organization covered by HIPAA, I suggest the following initial steps:<br>&nbsp;<br>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Map the healthcare data flows. You will need this to implement an encryption strategy, and it will be required under the proposed rules.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Start talking to your software vendors. Companies like Epic and Cerner (from Oracle) will address this through software updates and you will need to know their proposed schedules. In my experience it is the smaller software vendors who will need prodding. Make a list and give them a call.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Assess the impact on your hardware environment. Encryption may require upgrades to handle increased demand on CPUs.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Encryption key management with a proper KMS is probably the biggest challenge to an encryption strategy. Understand best practices in this area and be sure your vendors line up. Getting this right at the beginning will save a lot of headaches later.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Start talking to management right now. This will be a significant change and they should get prepared.<br>&nbsp;<br>&nbsp;Yes, I know – encryption is not a perfect solution. No security solution that we deploy is perfect. But it can substantially reduce the loss of unprotected healthcare data.<br>&nbsp;<br>I will try to post more about this as the proposed rule-making proceeds.<br>&nbsp;<br><a href="https://infosec.exchange/tags/HIPAA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HIPAA</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://infosec.exchange/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://infosec.exchange/tags/MSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSP</span></a> <a href="https://infosec.exchange/tags/MSSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSSP</span></a></p>
ThirdTier Amy<p>Read up on growing and managing an MSP. A whole series of articles awaits and it's not your standard MSP stuff. It's a map for ease and success. </p><p><a href="https://infosec.exchange/tags/MSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSP</span></a> <a href="https://infosec.exchange/tags/MSSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSSP</span></a> <a href="https://infosec.exchange/tags/smallbusiness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>smallbusiness</span></a><br><a href="https://www.thirdtier.net/2024/04/10/embracing-change-and-growth-in-your-msp/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">thirdtier.net/2024/04/10/embra</span><span class="invisible">cing-change-and-growth-in-your-msp/</span></a></p>
ThirdTier Amy<p>Getting funds as a small MSP is worth it. In this episode, James and I tell you how we do it. Hint: Don't assume no means no.</p><p><a href="https://infosec.exchange/tags/MDF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MDF</span></a> <a href="https://infosec.exchange/tags/MSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSP</span></a> <a href="https://infosec.exchange/tags/MSSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSSP</span></a><br><a href="https://smbcommunitypodcast.com/2024/04/tracking-mdf-as-a-small-msp/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">smbcommunitypodcast.com/2024/0</span><span class="invisible">4/tracking-mdf-as-a-small-msp/</span></a></p>
ThirdTier Amy<p>The rules for determining whether someone is an employee or contractor were just updated. The federal register is a long read. Maybe this post will help. </p><p><a href="https://infosec.exchange/tags/NSITSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NSITSP</span></a> <a href="https://infosec.exchange/tags/MSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSP</span></a> <a href="https://infosec.exchange/tags/MSSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSSP</span></a> <a href="https://infosec.exchange/tags/hiring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hiring</span></a><br><a href="https://bit.ly/3TAwVxc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/3TAwVxc</span><span class="invisible"></span></a></p>
ThirdTier Amy<p><a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/msp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>msp</span></a> <a href="https://infosec.exchange/tags/mssp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mssp</span></a> <a href="https://infosec.exchange/tags/itsp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>itsp</span></a> <a href="https://infosec.exchange/tags/fightingcybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fightingcybercrime</span></a><br><a href="https://bit.ly/3uANmzZ" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/3uANmzZ</span><span class="invisible"></span></a></p>
ThirdTier Amy<p><a href="https://infosec.exchange/tags/MSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSP</span></a> <a href="https://infosec.exchange/tags/MSSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSSP</span></a> <a href="https://infosec.exchange/tags/ITSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITSP</span></a> <a href="https://infosec.exchange/tags/fightingcybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fightingcybercrime</span></a><br><a href="https://bit.ly/3T7s8Dm" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/3T7s8Dm</span><span class="invisible"></span></a></p>
LimaCharlie<p>Bi-directionality is a critical capability for service providers who want to offer automated and responses to threat detections. You may think of bi-directionality as a function of EDR agents, which is true.</p><p>However, the SecOps Cloud Platform expands bi-directionality (and automated response capabilities) to also include:</p><p>&gt; SaaS applications and services</p><p>&gt; Third-party telemetry feeds</p><p>&gt; API-integrated security tools</p><p>Read more: <a href="https://limacharlie.io/secops-cloud-platform-guide-service-providers?utm_content=317102226&amp;utm_medium=social&amp;utm_source=linkedin&amp;hss_channel=lcp-28607498" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">limacharlie.io/secops-cloud-pl</span><span class="invisible">atform-guide-service-providers?utm_content=317102226&amp;utm_medium=social&amp;utm_source=linkedin&amp;hss_channel=lcp-28607498</span></a></p><p><a href="https://infosec.exchange/tags/automation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>automation</span></a> <a href="https://infosec.exchange/tags/MSSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSSP</span></a> <a href="https://infosec.exchange/tags/secopscloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>secopscloud</span></a></p>
LimaCharlie<p>Less than 24 hours until our webinar with MSSP Alert! Join us for "A Smarter Approach to Managing Security Services" and discover a better way to run your security operations.</p><p>Learn how to break free from vendor lock-in, scale your services effortlessly, and transform your security operations with a cloud-native approach. </p><p>Don't miss this opportunity to learn how LimaCharlie's SecOps Cloud Platform can help you focus on what matters most - delivering excellent security services to your customers.</p><p>Register here: <a href="https://msspalert.com/webcast/a-smarter-approach-to-managing-security-services-the-secops-cloud-platform?utm_source=LimaCharlie" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">msspalert.com/webcast/a-smarte</span><span class="invisible">r-approach-to-managing-security-services-the-secops-cloud-platform?utm_source=LimaCharlie</span></a></p><p><a href="https://infosec.exchange/tags/MSSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSSP</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
LimaCharlie<p>Join us as we team up with MSSP Alert for an exclusive webinar: "A Smarter Approach to Managing Security Services".</p><p>In this informative session:</p><p>- Discover how to eliminate vendor lock-in constraints and reduce infrastructure costs<br>- Learn strategies for effortless service scaling<br>- See how cloud-native security operations can transform your MSSP/MDR business</p><p>It's time to stop managing infrastructure and start growing your security business. Let LimaCharlie's SecOps Cloud Platform handle the heavy lifting while you focus on delivering top quality services to your customers.</p><p>Register now: <a href="https://msspalert.com/webcast/a-smarter-approach-to-managing-security-services-the-secops-cloud-platform?utm_source=LimaCharlie" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">msspalert.com/webcast/a-smarte</span><span class="invisible">r-approach-to-managing-security-services-the-secops-cloud-platform?utm_source=LimaCharlie</span></a></p><p><a href="https://infosec.exchange/tags/MSSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSSP</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
ThirdTier Amy<p>🚨🎥 Missed our Live Cast Show? No worries! Catch the recording now! 📡✨ 𝗗𝗶𝘃𝗲 𝗶𝗻𝘁𝗼 𝘁𝗵𝗲 𝗶𝗻𝘁𝗿𝗶𝗴𝘂𝗶𝗻𝗴 𝘄𝗼𝗿𝗹𝗱 𝗼𝗳 𝗰𝘆𝗯𝗲𝗿 𝗶𝗻𝘀𝘂𝗿𝗮𝗻𝗰𝗲 𝘃𝘀. 𝗠𝗦𝗣𝘀. Discover the hidden tensions and game-changing insights that could impact your digital future! 💻🔍 ! 👀👇 <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/MSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSP</span></a> <a href="https://infosec.exchange/tags/MSSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSSP</span></a> <a href="https://infosec.exchange/tags/cyberinsurance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberinsurance</span></a><br><a href="https://www.linkedin.com/events/cyberinsurancevs-themsp-can-twe7259532682437554176/theater/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linkedin.com/events/cyberinsur</span><span class="invisible">ancevs-themsp-can-twe7259532682437554176/theater/</span></a></p>
ThirdTier Amy<p>Read up on growing and managing an MSP. A whole series of articles awaits and it's not your standard MSP stuff. It's a map for ease and success. </p><p><a href="https://infosec.exchange/tags/MSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSP</span></a> <a href="https://infosec.exchange/tags/MSSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSSP</span></a> <a href="https://infosec.exchange/tags/smallbusiness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>smallbusiness</span></a><br><a href="https://www.thirdtier.net/2024/04/10/embracing-change-and-growth-in-your-msp/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">thirdtier.net/2024/04/10/embra</span><span class="invisible">cing-change-and-growth-in-your-msp/</span></a></p>
Habr<p>Переход с одной SIEM-системы на другую: пошаговая инструкция</p><p>Всем привет! Меня зовут Геннадий Мухамедзянов, в ИТ я более 20 лет, половину из них ― в кибербезопасности. У меня богатый опыт работы в центрах мониторинга ИБ, где я занимался установкой и настройкой различных СЗИ, в том числе систем класса SIEM. Импортозамещение в области кибербезопасности у всех на слуху: компании продолжают переходить на отечественные средства защиты. В статье я расскажу о тонкостях внедрения нового SIEM-решения в развернутый SOC и о том, как встроить его в существующие в организации процессы, чтобы замена предшественника прошла безболезненно. Чтобы добавить больше практической составляющей, буду рассматривать задачу на примере миграции на MaxPatrol SIEM ― систему выявления инцидентов ИБ российского вендора Positive Technologies. Больше про опыт миграции →</p><p><a href="https://habr.com/ru/companies/pt/articles/856156/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">habr.com/ru/companies/pt/artic</span><span class="invisible">les/856156/</span></a></p><p><a href="https://zhub.link/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://zhub.link/tags/soc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>soc</span></a> <a href="https://zhub.link/tags/siem" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>siem</span></a> <a href="https://zhub.link/tags/maxpatrol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>maxpatrol</span></a> <a href="https://zhub.link/tags/mssp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mssp</span></a> <a href="https://zhub.link/tags/%D0%B8%D0%BC%D0%BF%D0%BE%D1%80%D1%82%D0%BE%D0%B7%D0%B0%D0%BC%D0%B5%D1%89%D0%B5%D0%BD%D0%B8%D0%B5_%D0%BF%D0%BE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>импортозамещение_по</span></a> <a href="https://zhub.link/tags/%D0%BC%D0%B8%D0%B3%D1%80%D0%B0%D1%86%D0%B8%D1%8F" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>миграция</span></a></p>
ThirdTier Amy<p>Getting funds as a small MSP is worth it. In this episode, James and I tell you how we do it. Hint: Don't assume no means no.</p><p><a href="https://infosec.exchange/tags/MDF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MDF</span></a> <a href="https://infosec.exchange/tags/MSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSP</span></a> <a href="https://infosec.exchange/tags/MSSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSSP</span></a><br><a href="https://smbcommunitypodcast.com/2024/04/tracking-mdf-as-a-small-msp/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">smbcommunitypodcast.com/2024/0</span><span class="invisible">4/tracking-mdf-as-a-small-msp/</span></a></p>