RESOURCES

Our Resources page contains the most current information on our services, cybersecurity insights and facts, and reports and whitepapers geared to provide unique information on trends and events in the IT security industry.

Industry Reports

Anatomy of a Hack

The Sony Breach Investigation Provides Unprecedented Detail

Incident response planning is crucial; however, organizations have learned that many are still not prepared to handle a cyber attack.

The Growing Threat of Ransomware Report

Why Organizations Need to Prepare for a Ransomware Attack

Ransomware has become the most serious threat to IT security teams over the past two years. Our 33 page report illustrates how the Ransomware threat has exploded and what may be coming next.

Cybersecurity Statistics You Won’t Believe

Critical Cybersecurity Statistics You Must Know

We have compiled dozens of critical cybersecurity statistics from leading research organizations that paint a comprehensive, yet alarming picture of the state of IT security.

SecureOps Videos

Security Operations Center

Roles, Responsibilities and Challenges of the Modern SOC

Eric Duval is a Senior Security Manager or Senior SOC Manager at SecureOps and has handled a variety of roles in the SOC in his 8-year tenure. His veteran perspective on the roles, responsibilities and challenges of various security operation center positions provides useful knowledge for folks entering the industry as well as experienced security staff. From managing security technology to dealing with Ransomware and DDoS attacks, Eric covers wide-ranging topics with clear insight and answers.

Log Monitoring & Management

Why Log Monitoring is Critical to Maintaining Security & Compliance

Erik Montcalm the Vice-President, Services & Technologies at SecureOps discusses the critical aspects of log monitoring including dealing with encrypted traffic that may be hiding malware, analyzing logs to uncover malicious activity, maintaining compliance, and managing SIEM’s for clients.

Bug Bounty

Understanding Bug Bounty and Pen Testing Programs

Jasmin Landry a Senior Cyber Security Engineer at SecureOps certified in CEH, GWAPT, and has a OSCP from Offensive Security discusses the value of Pen Testing and Bug Bounty programs. Jasmin is ranked in the top 50 in Bugcrowd’s global ranking and thus has a unique perspective on improving security by uncovering vulnerabilities with Pen Testing and Bug Bounty programs.

Infographics

Service Brochures

Cybersecurity Statistics You Won’t BelieveDownload Our 24-Page Cybersecurity Statistics Report
We have compiled dozens of critical cybersecurity statistics from leading research organizations that paint a comprehensive, yet alarming picture of the state of IT security. Download the 24 page free report here!....
Download Report