Latest Articles

Small and Medium-sized Enterprises are main targets for Cyber Breaches

by in Blog

Small and medium-size enterprises (SMEs) are vital to the communities. They might be small in stature but important to the global economy. More concerning, SMEs do not have resources or dedicated cybersecurity team to protect themselves against big cyber attacks, data breaches, and hackers. Cybersecurity is an increasing issue amongst SMEs. It is not the […]


by in Blog

Various companies and organizations keep getting hacked. Every single hack becomes a great marketing opportunity for various cyber-related companies and investors. The stock market keeps soaring in 2017. But especially 2017 has been good for those companies that specialize in mitigating major damages in cyber. In the world of finance, there is a relatively new […]

CyberSecurity from the Inside Out

by in Blog

Through extensive research and technological development, the guidelines for trustworthy cybersecurity operations have evolved. Secure systems were advanced and provide capabilities, functions, services, and operations to prevent a wide range of disruptions, threats, and other hazards. Simultaneously, hacking techniques and tools are progressing as well. And from all the breaches that keep occurring it is […]


by in Blog

Today there is an exponential rise in the number in attacks on the US Government and Commercial enterprise networks. These events have executives more proactive than previous years when it comes to their opinions of cyber security countermeasures. Firewalls, antivirus, IPS, IDS, are expected to assist with defending against threats but with the advancement of […]


    The First and Only Incident Response Community laser-focused on Incident Response, Security Operations and Remediation Processes concentrating on Best Practices, Playbooks, Runbooks and Product Connectors. In building the Community, the IRC is aimed to provide, design, share and contribute to the development of open source playbooks, runbooks and response plans for the industry community to use. These playbooks or recipes can be in the form of flowcharts, diagrams, sequences, scripts, orchestration platform playbooks and product integration connectors.

    Subscribe to receive updates from the

    Incident Response Consortium