Company turns to Secureworks Taegis XDR and Taegis ManagedXDR for comprehensive monitoring and detection of threats.
Secureworks
Cybersecurity by security experts for security experts. We are in the fight with you!
Sansan is constantly reviewing its security measures to respond to cyberattacks, which become more malicious and sophisticated with each passing year. As part of this effort, Sansan implemented a project to deploy XDR (Extended Detection & Response) products. Sansan's Kenta Sato, CSIRT Group and Information Security Management Group, shed some light on the background, saying, "We conduct penetration tests every year, and one of the issues that came up was the need to improve our threat detection capabilities. In recent years, an unrelenting stream of new attack methods have emerged, and we need to be able to detect them accurately."?
In selecting a platform, the company required not only excellent threat detection capability, but also a wide range of supported services and solutions, ease of use, and a reasonable cost. These requirements were met by Secureworks' Taegis XDR and the Taegis ManagedXDR managed detection and response (MDR) service.
Read the case study: Sansan Enhances Threat Detection with Secureworks | Secureworks
Additional resources: Start Your Taegis? XDR Free Trial | Secureworks
What is the Cyber Incident Reporting for the Critical Infrastructure Act of 2022 (CIRCIA) and What should organizations be doing now to prepare for it?
The Cyber Incident Reporting for Critical Infrastructure Act was signed into law in 2022. It tasks CISA with developing and implementing rules for organizations in the critical infrastructure sectors to report certain types of cyber incidents and ransomware payments.??
Organizations should begin reviewing the critical infrastructure sectors and the specific rules proposed for them, and they should take the opportunity to participate in the public comment period that ends on June 3.
领英推荐
Organizations should also take a look at their incident response plans and their data retention policies, especially as they prepare budgets for next year. Data retention will be an important element of the rules, and organizations should be factoring the potential cost of retention/storage should they have an incident. The rules require up to?one year of data retention?with these incidents. Companies should also be investing properly in their security programs now to ensure they have continuous monitoring and end-to-end detection and response capabilities. Having a robust cybersecurity plan will help organizations minimize incidents and mitigate the requirement to report on many of them.
One-third of all breaches stem from vulnerabilities. To reduce the risk of cyber breaches, it is imperative that organizations view vulnerabilities in the context of threat investigations to fully understand root cause and impact. Security operations and vulnerability management programs must work in tandem to improve your overall security posture.
Join us as we look at real incidents that began with vulnerability exploitations and explain how new solutions foster collaboration between threat detection and vulnerability management and enable security teams to better prevent, detect, and respond to incidents most likely to disrupt your business operations.
Additional resources: 2023 State of the Threat Report | Secureworks