Ransomware Incident Response Plan – Part 2
Ransomware was and still is one of the most dangerous attacks that can cause catastrophic consequences to the endpoint system […]
Ransomware Incident Response Plan – Part 1
Ransomware was and still is one of the most dangerous attacks that can cause catastrophic consequences to the endpoint system […]
Cyber Threat Intelligence and OSINT
We are living in a world where any number of cyber threats can bring an organization to its knees and […]
12 Steps to Secure Your Organization’s Office 365 Accounts Effectively
Recently, our Incident response team at HAWKEYE received a frantic call from one of our clients saying that their o365 […]
What to Train Your User for Effective Email Security
User’s is the most vulnerable asset for any organization. We can deploy security controls for any other vulnerability, but not […]
Cyber Threat Management with MITRE ATT&CK – Part 1
Let’s agree on this first, job of a SOC analyst is TOUGH, as tough as finding a needle in a […]
Automated Threat Response with SOAR
Earlier, there were very few options available to sneak into an organisation’s network. Today, the ways in which cyber criminals […]