10 BEYOND THE ENTERPRISE

Much of the defensive security operations work we’ve discussed so far in this book has been naturally very introspective. For the most part, we’re comfortable controlling what goes on within the physical and virtual walls of our enterprise – we have influence and we have tools that give us plenty of insight in detecting and responding to potential security incidents. Given this, blue teams can sometimes be tempted to close their eyes and cover their ears against the world outside their immediate control. By doing this, we’re potentially missing out on a great deal of insight and information that could increase our value, from both a security and a service perspective.

The internet is clearly a goldmine of information, ...

Get Security Operations in Practice now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.