Login to profile

Articles and White Papers

August 2024: Maximising SOAR in SOCs

The Security Orchestration, Automation, and Response (SOAR) framework
revolutionises security operations by enabling teams to seamlessly
orchestrate, automate and respond to security incidents. In today’s
rapidly evolving threat landscape, SOAR technology also plays a pivotal
role in enhancing the efficiency and effectiveness of Security Operations
Centres (SOCs). This white paper delves into the significance of SOAR in
SOC environments, its benefits, challenges and strategies for successful
implementation.

You can download a paper that describes this in more detail here: Maximising SOAR in SOCs

June 2024: The SOC’s Biggest Pain: Asset Inventory

Amid a wide range of challenges encountered by these entities, one obstacle
persistently stands out: the effective management of asset inventory.

CREST’s Security Operations Centers (SOC) Focus Group is pleased to present its latest whitepaper: The SOC’s Biggest Pain: Asset Inventory.

July 2019:  Disruptive Delivery Methods In Penetration Testing

For some time, CREST has been looking into the impact of disruptive delivery methods on penetration testing services.  In particular, CREST has been trying to understand the implications that these methods have on the buying communities, existing suppliers of services, individuals delivering services and legal and regulatory requirements in a balanced, considered and collaborative way.

You can download a paper that describes this in more detail here: Disruptive Delivery Methods In Penetration Testing

February 2019:  Cybercriminals get better at marketing

CREST discusses what Chief Information Officers (CIOs) can learn from cybercriminals when it comes to mitigating risk and how Chief Marketing Officers (CMOs) can pick up some marketing tips.  

July 2018: Connected and Autonomous Vehicles Report

The autonomous vehicle industry has shown interest in understanding how vehicles can be resilient to cyber­ attack, but this interest has not been translated into practical advice, agreed standards, or funding for research. This paper aims to highlight the broad issues and offer

solutions to the industry. Discussions around security in the industry have been primarily concerned with access control to the vehicle, authentication and data management as manufacturers are waiting for the technology to become more prevalent before addressing cyber security. However, this will ultimately cost more and result in more vulnerabilities than building resilient systems from the beginning.

Download the report here: Connected and Autonomous Vehicles Report