Posts Tagged ‘compromise assessment’

Compromise vs Vulnerability Assessments: Which Should You Choose First?

cyber risk compromise assessment

During the recent International Cyber Security and Intelligence Conference info security execs were lectured on the importance of being proactive vs reactive to stop cyberattacks. As part of a proactive strategy speaker Nik Alleyne, senior manager of cyber security at Forsythe Solutions Group, recommended vulnerability assessments and regular penetration tests. While these are important tools for evaluating cybersecurity risk, they only answer half of the security paradox; “Can I be hacked?” They do not answer the more vital question; “Am I already breached?”

Read More

The Role of Compromise Assessments in Enterprise Security

The role of intrusion detection is typically fulfilled by real-time intrusion detection systems and anti-virus software in conjunction with a continuous monitoring strategy. A compromise assessment differs from intrusion detection in that it is an active dedication of analytical resources with a focus on indicators of successful compromise. 

Read More