Topic: Security operations and resilience
Swimming with cyber-sharks and fending off today’s great white: ransomware
Ransomware is today’s great white cyber-shark. Learn the facts so that you can better mitigate cyber-shark attacks.
Integrative planning: Minimize failure by planning for it
Accenture's Eric Welling explains how integrative planning exercise can help minimize failure in today's cybersecurity environment. Read more.
Knowing the enemy is one thing...
Accenture's Jakub Pitha explains why knowing yourself is as important as knowing the enemy in cybersecurity for improving security posture. Read more.
Want cloud-based forensics? Consider these technical tips from the trenches
Accenture's blog outlines how to implement and get the most from cloud-based cybersecurity forensics with some hard-won lessons. Read more.
Suggested steps for a turnkey deployment of cloud-based forensics
Accenture's Mark McCurdy talks about implementing and getting the most from cloud-based cybersecurity forensics. Read more.
Want cloud-based forensics with less turmoil? Here are the top tech tips you will want to know.
Accenture's Mark McCurdy shares how to implement and get the most from cloud-based cyber security forensics. Read the first of a three-part blog series.
Accenture adversary simulation service: Fueled by iDefense threat intelligence
Accenture's Advanced Adversary Team utilizes iDefense Threat Intelligence to build industry-and client-relevant adversary simulation exercises. Learn more.
Threat intelligence support for rapid incident response
This blog post shares cyber defense use cases that demonstrate how to get the most from our threat intelligence.
Petya/Petwrap malware alert
Petya/Petwrap malware was detected in June 2017 when companies’ computers in Europe, the Middle East and the U.S. were hit with ransom notes. Learn more.
Subscribe to Accenture's Cyber defense blog Subscribe to Accenture's Cyber defense blog
Follow us: Follow us: