<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Incident Response on S3H.com</title>
    <link>https://s3h.com/tags/incident-response/</link>
    <description>Recent content in Incident Response on S3H.com</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Wed, 04 Feb 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://s3h.com/tags/incident-response/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Ransomware Recovery Is Where Security Programs Actually Get Tested</title>
      <link>https://s3h.com/2026/02/04/ransomware-recovery-is-where-security-programs-actually-get-tested/</link>
      <pubDate>Wed, 04 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://s3h.com/2026/02/04/ransomware-recovery-is-where-security-programs-actually-get-tested/</guid>
      <description>&lt;p&gt;Ransomware preparation is the security investment that organizations discover the quality of during the worst possible moment. The backup strategy that was designed but not tested reveals its gaps when the organization needs to restore from it. The incident response plan that was written but not rehearsed reveals its gaps when the team is trying to execute it under pressure. The cyber insurance policy that was procured but not fully read reveals its requirements when the claim is filed.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Endpoint Detection and Response Has Not Solved the Endpoint Security Problem</title>
      <link>https://s3h.com/2026/01/07/endpoint-detection-and-response-has-not-solved-the-endpoint-security-problem/</link>
      <pubDate>Wed, 07 Jan 2026 00:00:00 +0000</pubDate>
      <guid>https://s3h.com/2026/01/07/endpoint-detection-and-response-has-not-solved-the-endpoint-security-problem/</guid>
      <description>&lt;p&gt;Endpoint Detection and Response platforms replaced antivirus as the dominant endpoint security technology on the basis that signature-based detection could not keep pace with the volume and variety of modern malware. The replacement was justified. EDR&amp;rsquo;s behavioral detection, continuous telemetry, and forensic capability represent a genuine improvement over signature-based antivirus in detecting and investigating endpoint threats.&lt;/p&gt;&#xA;&lt;p&gt;The marketing that followed — the promise of comprehensive endpoint security that would significantly reduce breach frequency and impact — overstated what the technology can deliver. EDR is better than what it replaced. It is not the endpoint security solution. Endpoints continue to be compromised at scale in organizations running mature EDR deployments because the threats that matter most have adapted to operate within the behavioral envelope that EDR considers legitimate.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
