Nixu Cyber Defense Center under the hood

Nixu CDC

Nixu CDC

August 21, 2020 at 09:00

If you have ever visited any of the Nixu offices or perhaps spent time at information security events such as Disobey, you have more than likely encountered people wearing black hoodies with the text Cyber Defense Center Nixu

Nixu's SOC analyst wearing a hoodie

What do these people do for work, and what exactly is the Cyber Defense Center? Is it a Security Operations Center? Or is it about digital forensics?

Well, we do both and loads more. 

Cyber Defense Center is Nixu's service family that covers Managed Detection and Response (MDR) and Security Operations Center (SOC) services. We prevent, detect, and mitigate threats in all digital environments ranging from traditional IT and cloud to the internet of things and OT. Our 24/7 service helps you protect your business-critical assets and operations flexibly.

Cyber Defense Center is Nixu's service family that covers Managed Detection and Response (MDR) and Security Operations Center (SOC) services. We prevent, detect, and mitigate threats in all digital environments ranging from traditional IT and cloud to the internet of things and OT.

 

No security without monitoring

A central area of cybersecurity is the monitoring of log events and network traffic to detect signs of malicious activities. One of the challenges in security operations is the balance between getting enough data but not too much data. Millions of events pass before SOC analyst's eyes every day, and our SIEM specialists must tweak the rules almost daily to make sense of some 200 events per second, which one server might generate. To be able to filter and cultivate data to spot anomalies, it is of utmost importance to decide what to prioritize to ensure the protection of the organization's most critical assets. 

The DFIR team is here to help

Our Digital Forensics and Incident Response (DFIR) team can take over the incident handling remotely or even travel on-site if there is a breach. The Nixu experts bring an incident response kit with them, including a disposable laptop, write blockers, and other forensics tools. Our forensic expert explains the content of the kit:

These computers are installed for forensic purposes at Nixu's office just before use. The data in them will never end up on our own computers or any of our networks. With write blockers, we can read data on the hard disk without, for example, altering evidence. 

 

Threat intel enables you to prepare

Some people in our Cyber Defense Center also focus on threat intelligence. Threat intel is more than just technical indicators of compromise such as known malicious IP addresses, or file hashes. 

Strategic threat intel focuses on cyber threat trends and the big picture. This information helps organizations understand what kind of threats their business will most likely face so they can develop their defenses in the right direction. 

Tactical threat intelligence focuses on the actual methods cybercriminals are using, which helps in ensuring that any attacks will be detected. 

Operational threat intel is especially useful in day-to-day cyber defense. The purpose of operational threat intelligence is to understand what the attackers are aiming to do. Is the threat in question a massive but untargeted malware campaign, or are we talking about espionage or financial fraud? This information helps organizations focus their efforts on mitigating the most severe threats.

A combination of technology and skills

We also have people specializing in threat hunting, user entity and behavior analytics (UEBA), vulnerability management, and red teaming. With the combination of the best of breed technology with the skills of top professionals in the field, we protect you from known and unknown threats.

Nixu has professionals specialized in SIEM, UEBA, threat hunting, threat intelligence, digital forensics and incident response and vulnerability management.

 

Want to learn more?

Check our whitepaper How companies get compromised? and learn more about detecting, preventing, and responding to cyber threats. 

Related blogs