search external-link twitter facebook feed google-plus linkedin angle-left angle-right angle-up angle-down youtube-play
The Hexadite Blog
Expert advice and round-the-web cyber security news to help secure your company. Get the latest industry insights delivered to your inbox.

Sign up and stay up-to-date.

Home>The Hexadite Blog
Blog /

Automated Incident Response is the Best Weapon Against the Casual Attacker

Recently, Anton Chuvakin, Gartner Research VP, called on companies to get good at fighting basic, commodity attacks. In his blog Defeat the Casual Attacker First!!, he finds it “highly illogical and, in fact, wasteful, to attempt stopping or detecting an advanced attacker before you managed to succeed with a common one.” He has a point! […]

Blog /

“I Love Lucy” as an allegory for the weakness of human operations and the importance of automation

A good old example of why automation in important and how, in many cases, it transcends traditional human-operations and weaknesses (specifically, the common weakness to chocolate…):  

Blog /

Achieve Business Value by Automating your Cyber Incident Response Program

By Eran Barak, CEO of Hexadite In our previous blog we laid out, “10 Steps to Building an Effective Cyber Incident Response (IR) Program”. Unfortunately, too many times we encounter people who consider the IR program too overwhelming, impossible to manage on a daily basis with a limited crew and resources. That’s where Automated Incident Response […]

Blog /

10 Steps to Building an Effective Cyber Incident Response Program

By Barak Klinghofer, CPO of Hexadite Having trained CIRT teams and working as an Incident Response consultant for years, I still continue to receive phone calls, emails and 1×1 discussions regarding the Incident Response process. It only makes sense now to lay these out on paper. This program is what I see as the summary of our […]

Blog /

Incident Response is not only about Remediation

Incident Response is not only about Remediation By Barak Klinghofer, CPO of Hexadite The Oxford dictionary defines “Remedy” as “A medicine or treatment for a disease or injury”, or “A means of counteracting or eliminating something undesirable”. As it is, this definition is very relevant to cyber-security incidents and their remediation process. That said, many of the […]

Blog /

Incident Response is not Forensics

Incident Response is not Forensics By Barak Klinghofer, CPO of Hexadite Many times you hear people saying: “Wait, isn’t Incident Response just like Forensics? Both use similar methods to analyze threats or attacks and understand what to do with them”. Well, not really. Let’s understand the differences between the two, specifically in the world of […]

Blog /

Applying OODA Loop in Incident Response Programs

The world of cyber-security is in many ways similar to a battlefield – the two sides, the attacker and the defender, try to achieve their goals against their opponent in the most effective way and with as little damage to themselves as possible. So, it is only reasonable that when an organization is planning its […]

Blog /

The Top Three Reasons Incident Response is Broken (And How to Fix It)

The Top Three Reasons Incident Response is Broken (And How to Fix It) By Eran Barak, CEO of Hexadite We live in a world where cyber-attacks are going to happen – regardless of how many precautions we take or how many layers we use to fortify our online resources. Incident Response (IR) is designed to […]