Incident Response

What are the 6 Phases in Cyber Security Incident Response Plan?

A cybersecurity incident response plan (or IR plan) is a written action-plan that is documented for the IT Teams responding to computer information security incidents. NIST (National Institute of Standards and Technology, USA) has created the Computer Security Incident Handling Guide that outlines 4 key phases of the Incident response plan and process. Another institute …

What are the 6 Phases in Cyber Security Incident Response Plan? Read More »

Creating Disaster Recovery and Incident Response Plan

Today’s article is all about understanding how to create disaster recovery and incident response plans – very important from security, audit and compliance points of view. Remediating cyber incidents should start from the basics of creating a disaster recovery plan and an incident response plan. For any security solutions engineer creating security solutions for clients …

Creating Disaster Recovery and Incident Response Plan Read More »

Cyber Security Incident Response Books For Beginners and Advanced Computer Forensics realm

What is Incident Response? 1. Intelligence-Driven Incident Response: Outwitting the Adversary “Predictive pre-defense” and “prompt and accurate incident response” should be the two key drivers which makes Intelligence-Driven Incident Response: Outwitting the Adversary one of the most useful books for realizing Intelligence-driven incident response. The books throws light intelligence as the main vector in the …

Cyber Security Incident Response Books For Beginners and Advanced Computer Forensics realm Read More »

NIST Incident Response Plan & Playbook

Cyber Security Incidents – 2020 Statistics Business Email Compromise / Email Account Compromise Scam Costs $26 Billion (As per Federal Bureau of Investigation (FBI) Internet Crime Complaint Center’s (IC3) report ) More Than $3.5 Billion lost to global cybercrimes last year – FBI IC32019 Internet Crime Report Thanks to its global products, Apple is ‘apple’ of brand impersonations cyberattackers’ …

NIST Incident Response Plan & Playbook Read More »

Scroll to Top