How to Build a Government SOC on a Budget

Faced with an endless barrage of threats and vulnerabilities, finding the time to develop a proactive risk mitigation strategy is an uphill struggle for government organizations. With so much energy focused  on protecting the perimeter and preventing network penetration, malicious actors (the enemy with no face) already inside your network often goes unnoticed (case in point, the 2015 OPM breach).

Container Security: Vulnerabilities and Countermeasures

Containers offer many advantages for management, deployment, and efficient development of applications.  Like any technology, however, they are subject to attack from malicious actors, and require diligent security.  Vulnerabilities can appear in the container images themselves, in the registry where they are stored, or in the orchestration and deployment of the images.  Let’s take a look.

Image Vulnerabilities & Countermeasures

The Need for Advanced Threat Hunting

The 2017 DefCon conference featured former World Chess Champion Garry Kasparov, who spoke about artificial intelligence, computers, and of course, chess.  After losing a match to a purpose-built computer in 1997, Kasparov realized that the machine, although it had beaten him, was not truly intelligent:  it had simply out-calculated him, by examining over 200 million chess positions per second.  Kasparov soon devised “advanced chess”, in which a strong human player teams up with a computer.   Advanced chess combines the best human qualities of imagination, judgment,