TAG Cyber: Transform Your MSP to MSSP

In short, the goal should be for the MSP to be transformed into an MSSP, and this must be done without any degradation to existing support. But it also must be done without the need to recruit new staff with cybersecurity skills. Rather, the goal must be to find methods that can improve day-to-day security support for existing customers, while also enabling new for-pay security services that can be added as new offers.
esg-technical-review-of-the-respond-analyst-the-virtual-security-analyst

ESG Technical Review of The Respond Analyst: The Virtual Security Analyst

There is no shortage of declarations for revolutionary approaches to threat protection. On one thing that the security community can agree: automation is essential. This is why the latest Technical Review from Enterprise Strategy Group (ESG) is so important. The paper identifies how the Respond Analyst architecture functions as a virtual cybersecurity analyst. ESG details how the Respond Analyst manages a variety of automation decision models, including telemetry by sensor type, activity and incident profile.
ponemon-institute-report-the-economics-of-security-operations-centers

Ponemon Institute Report: The Economics of Security Operations Centers

Ponemon Institute surveyed IT and IT security practitioners in organizations that have a SOC and are knowledgeable about cybersecurity practices in their organizations.

From Guards to Detectives: Evolving the Junior Security Analyst Role

2020 Tag Cyber Security Annual: Outlook for 50 Cyber Controls

3-cs-of-security-operations

3 C’s of Security Operations

Reduce vulnerabilities with a sustainable, 24 x7 continuous security operation.

Join our growing community! Subscribe to our newsletter, the "First Responder Notebook," delivered straight to your inbox.