The Last Watchdog Talks to CRITICALSTART About Radical Transparency
At CRITICALSTART, we’ve made the concept of “radical transparency” a cornerstone of our Managed Detection & Response (MDR) offering. Simply put, radical transparency means our customers see everything our analysts are doing 24x7x365. And we mean everything. Customers work from the exact same interface and access all consoles, audit logs, analytic rules, playbooks, and Service Level Agreement (SLA) metrics as our internal team. It’s a concept that’s core to our DNA, and something we believe all companies should demand from their service providers, whether that transparency relates to security or any other aspect of IT.
It’s important to understand: Radical transparency is not just a marketing term or a gimmick. It’s in direct response to the input we received from enterprises across all sectors when we set out to design our MDR offering. We asked some of the biggest names in the most data-intensive and security-conscious industries about their greatest needs and biggest frustrations with their existing security service providers. Almost unanimously, they put a lack of transparency and the “black box” nature of those relationships at the top of the list. From those conversations, radical transparency was born.
Recently, our VP of Managed Services Jordan Mauriello, spent time with the one and only Byron Acohido. Acohido is the Pulitzer-winning journalist and founder and executive editor of The Last Watchdog on Privacy & Security. Specifically, they talked about why radical transparency is a necessary component in any enterprise/service provider partnership, and how, combined with a Zero-Trust approach to alert management, it helps ensure a rock-solid security strategy.
Read Acohido’s blog and listen to the podcast interview with Jordan Mauriello on The Last Watchdog.
April 29, 2019
Stay Connected on Today’s Cyber Threat Landscape
[gravityform id=”6″ title=”false” description=”false”]RELATED RESOURCES
- Webinar
Navigating Through a Blizzard of Logs: Advanced Threat Hunting & IR Techniques
Watch the On-Demand Recording of Navigating Through a Blizzard of Logs: Advanced Threat Hunting &... - News
CISA Adds Mitel, Oracle, flaws to the KEV list
January 10, 2025 | CISA has updated its Known Exploited Vulnerabilities (KEV) catalog with critical ... - Press Release
Built In Honors Critical Start in Its Esteemed 2025 Best Places To Work Awards
Critical Start Earns Spot 100 Best Midsize Places to Work in Dallas for 2025 on Built In’s B...
RESOURCE CATEGORIES
- Buyer's Guides(1)
- Consumer Education(40)
- Consumer Stories(2)
- Cybersecurity Consulting(7)
- Data Breaches(15)
- Data Privacy(43)
- Incident Response(2)
- Interview(51)
- MDR Services(77)
- MobileSOC(9)
- News(5)
- Press Release(97)
- Research Report(11)
- Security Assessments(4)
- Thought Leadership(20)
- Threat Hunting(3)
- Video(1)
- Vulnerability Disclosure(1)