• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
combined security practices changing the game for risk management

Combined Security Practices Changing the Game for Risk Management

You are here: Home / General Cyber Security News / Combined Security Practices Changing the Game for Risk Management
February 5, 2024

A considerable obstacle in just cyber security at existing is that there are a good deal of risk management platforms obtainable in the current market, but only some deal with cyber hazards in a very good way. The the greater part will shout alerts at the buyer as and when they come to be clear and trigger fantastic pressure in the method. The issue currently being that by working with a reactive, rather than proactive solution, several risks just sit there, dormant, until an crisis comes about.

‘Dealing with SOC Functions for a lot more than a decade, I have viewed practically 60 % of SOC Incidents are repeat conclusions that keep re-surfacing because of to fundamental unmitigated Threats. In this article the actors might be unique, having said that the risk is generally the very same. This is resulting in important alert fatigue.’ – Deodatta Wandhekar, Head of World SOC, SecurityHQ.

Combining Frameworks and Ideal Methods

These risks can be prevented. A platform that combines the very best techniques of various frameworks is the solution to deal with this issue.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


What is NIST?

The Nationwide Institute of Benchmarks and Technology (NIST) performs a central position in presenting corporations with an possibility to create a complete cybersecurity posture to stop or lessen the impact of cyberattacks. NIST delivers a complete and structured tactic to assess, handle, and mitigate cybersecurity challenges proficiently.

Go through ‘Building a Resilient Electronic Long run: NIST’s Impression on Cybersecurity’ for extra details on NIST constructions.

What is MITRE?

The MITRE Adversarial Techniques, Strategies, and Common Awareness (ATT&CK) framework is a know-how foundation of adversary practices, techniques, and treatments (TTPs). These TTP’s are dependent on genuine-globe observations, utilized by numerous risk actors, that have been built globally available to be utilized as the basis for threat models and methodologies. MITRE has a ‘mission to clear up issues for a safer planet, by bringing communities collectively to build additional successful security.’

Read ‘How the MITRE ATT&CK Framework Has Revolutionized Cyber Security’ for extra data on MITRE practices.

What is NCSC?

The Countrywide Cyber Security Middle (NCSC) brings together skills from CESG (the data assurance arm of GCHQ), the Centre for Cyber Assessment, CERT-UK, and the Centre for Defense of Countrywide Infrastructure (National Protective Security Authority, NPSA). It is a London-based group with the goal of making the UK a safer online place. They operate collaboratively with other regulation enforcement, protection, intelligence, and security businesses and international associates to guarantee their data is as correct and actionable as probable.

Risk Intelligence Put together with SHQ Response System

The SHQ Response System from SecurityHQ began as a innovative cyber incident reaction answer created for swift detection, assessment, and mitigation of security threats. It has now appreciably developed so that, according to a current push launch, ‘SecurityHQ has merged its mental property and awareness on risk mitigation and cybersecurity, and merged this with various identified resources in the industry, like NIST, NCSC, and MITRE to deliver actions on how to establish, map, and raise hazards.’

‘SHQ Reaction System will assistance lessen this inform exhaustion by focusing on mitigating the common risk. Not just that, it will be quintessential to translate a mere one particular liner Risk Statement into an actionable mitigation plan. SHQ Response platform will make Risk Creation a pretty easy system by giving the person with a library of intricately joined Danger Activities, Impacts and Controls by leveraging industry normal information foundation of NIST, MITRE and NVD.’ – Deodatta Wandhekar, Head of Global SOC, security

  • Work out the effects of security threats on small business.
  • Determine the chance of hazards going on.
  • Detect diverse techniques and strategies.
  • Know how to mitigate dangers.
  • Entry all the things from a one platform stage.
  • What to Do Next

    Orchestrate and permit collaboration, prioritize incidents, visualize threats, and empower integration with Incident Reaction.

    Compute the effect of security threats and the likelihood of dangers taking place, and emphasize how finest to mitigate these challenges with Risk Administration.

    No subject how great a tool’s ability is, keep in mind that a device is only as superior as the experts functioning/controlling it. To get the whole rewards of SHQ Response, you will need a workforce of experts able of examining and acting on facts and mitigating the challenges. To discover far more about Risk Management, contact the crew here.

    Take note: This article was expertly published by Eleanor Barlow, Information Manager at SecurityHQ.

    Uncovered this write-up exciting? Observe us on Twitter  and LinkedIn to examine extra exceptional written content we publish.


    Some elements of this post are sourced from:
    thehackernews.com

    Previous Post: «pegasus spyware targeted iphones of journalists and activists in jordan Pegasus Spyware Targeted iPhones of Journalists and Activists in Jordan
    Next Post: Patchwork Using Romance Scam Lures to Infect Android Devices with VajraSpy Malware patchwork using romance scam lures to infect android devices with»

    Reader Interactions

    Leave a Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    Primary Sidebar

    Report This Article

    Recent Posts

    • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
    • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
    • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
    • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
    • “Getting to Yes”: An Anti-Sales Guide for MSPs
    • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
    • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
    • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
    • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
    • 5 Threats That Reshaped Web Security This Year [2025]

    Copyright © TheCyberSecurity.News, All Rights Reserved.