Surviving a Cyber Security Incident – Part 1

Part 1 - Before the Storm By: Matthew Otte Throughout their many years of practice, Soterians have advised for, participated in, and commanded a large assortment of cyber security incident responses (IRs) in the form of both exercises and real-world events. Though no two response efforts are exactly alike, Soteria has discovered a [...]

Surviving a Cyber Security Incident – Part 12022-07-07T12:47:59+00:00

Understanding MDR

By: David S. MANAGE. DETECT. RESPOND. In any organization that uses computers to manage or operate their business, there is inherent risk of a cyber incident. The level of risk can vary based on the structure of systems, controls in place, the storage or transfer of sensitive information (e.g. financial, personal, health, or intellectual property), [...]

Understanding MDR2022-07-03T20:47:57+00:00

Solarwinds Supply Chain Compromise – Recommendations

On December 13, 2020 FireEye released their research into the compromise of the SolarWinds Orion supply chain, resulting in the compromise of a significant number of organizations around the world.  Recommendations for incident response have been published by multiple entities with intimate knowledge of the situation, including FireEye, Microsoft, and the United States Department [...]

Solarwinds Supply Chain Compromise – Recommendations2021-03-16T00:13:17+00:00

Mitigating the Risk of RDP

Remote Desktop Protocol, known as RDP, is a service built into Microsoft Windows operating systems that allows a user to connect to a remote computer over the network. This capability makes remote access and management of computer resources easier, which leads to efficiencies for IT staff. Unfortunately, RDP is also commonly leveraged by criminals [...]

Mitigating the Risk of RDP2021-03-16T00:13:40+00:00

Lexico vs Ransomware

Lexico vs. Ransomware Soteria recently has received urgent incident response requests from clients who had been hit with ryuk, banta, and, phobos ransomware. One of these clients had several systems already in the process of being encrypted when security professionals discovered the outbreak. After initial meetings and contracts were signed, through our Lexico [...]

Lexico vs Ransomware2019-09-20T18:33:39+00:00

Detectors as Code

The Challenge of Detector Management Security operations and monitoring teams face a variety of challenges: the rapid evolution of adversarial tradecraft, poor detector documentation, lack of detector version control, poor detection methodology, lack of testing procedures, and change control processes that are slow and time consuming. These issues plague security teams of all [...]

Detectors as Code2019-09-20T18:33:58+00:00
Go to Top