News & Resources

Security Operation Centers. Outsourced or Internal? Which is Better?

Security Operation Centers. Outsourced or Internal? Which is Better?

What a SOC Needs to Do An organization’s security operations center (SOC) is the core of its cybersecurity program.  The SOC includes the people, processes, and tools that the company uses to detect, protect against, and remediate cyber threats to the organization....

What are Insider Threats? How can you reduce risk?

What are Insider Threats? How can you reduce risk?

The Insider Threat: How To Mitigate The Top Three Human Risks To Your Company’s Information Systems. We lock our systems and networks down, we install the latest and greatest Intrusion Detection/Prevention Systems (IDS/ IPS), and we have the best physical security at...

12 Benefits of Outsourced Security Services

12 Benefits of Outsourced Security Services

Outsourced security services is an umbrella term that covers a number of different types of service providers.  It includes managed security service providers (MSSPs), managed detection and response (MDR), managed SOC services and similar services where an...

Managed 24/7 SOC – Why is it a necessity?

Managed 24/7 SOC – Why is it a necessity?

What is a SOC? A Security Operations Center (SOC) is the core of an organization’s cybersecurity program.  It is responsible for identifying and responding to cybersecurity incidents within the network. An organization’s SOC is composed of a few interrelated pieces:...

The Top 11 Benefits of Managed Security Services Providers

The Top 11 Benefits of Managed Security Services Providers

A Managed Security Services Provider (MSSP) is an external organization that handles some or all of an organization’s cybersecurity.  Partnering with an MSSP like Clearnetwork allows an organization to take advantage of a number of different advantages compared to...

Top 10 Intrusion Detection and Prevention Systems

Top 10 Intrusion Detection and Prevention Systems

Intrusion detection systems (IDS) and intrusion prevention systems (IPS) are designed to protect an organization from ongoing cyber threats.  However, not all of these systems work in the same way or have the same objectives.  Important distinctions between types of...

SIEM vs MSSP vs MDR vs SOCaaS

SIEM vs MSSP vs MDR vs SOCaaS

Understanding Managed Security Services Managed security services come in a wide range of potential offerings. The available services can vary greatly from provider to provider, even if they are advertised as the same thing. Understanding what to expect from each type...

Introduction to Threat Hunting – What, Why and How

Introduction to Threat Hunting – What, Why and How

Many organizations take a reactive approach to cybersecurity. Often, the first indication that they have that something is happening on their network is when they receive an alert of an attack in progress. However, by this point, it may already be too late to stop the...

HIPAA Compliance – What is HIPAA and how do I meet compliance?

HIPAA Compliance – What is HIPAA and how do I meet compliance?

What is HIPAA Compliance? HIPAA is the Health Insurance Portability and Accountability Act. Title II of the Act sets the physical, network, and process security standards required of organizations that handle protected health information (PHI). HIPAA compliance is...

Prevention vs Detection-based Security Approach

Prevention vs Detection-based Security Approach

Why You Should Add Detection To Your Security Strategy A number of different approaches to cyber defense exist.  However, they can generally be classified into prevention-based and detection-based strategies.  In a prevention-based strategy, an organization does its...