For today’s companies, whatever their core business, reliance on IT systems almost certainly means that they have become a technology company. Digital transformation is everywhere – from looking to improve customer experience to businesses seeking...
Read MoreSecurity operations, by their nature, are a highly technical and complex set of activities that demand SOC teams deeply understand the threats they face and the attack vectors they protect. Gaining complete coverage was challenging, and without architecture...
Read MoreWhether you're building a Security Operations Centre (SOC) or replacing your existing security monitoring tools, when it’s time to evaluate the best Security Information and Event Management (SIEM) product for your business, the decision on which platform...
Read MoreSecurity Analytics solutions have expanded from rules-based detection to include data science methods such as machine learning and artificial intelligence. This is in response to environmental factors such as growing data volumes, infrastructure complexity...
Read MoreCyber threat actors are continually innovating in an attempt to bypass modern cyber security controls. Security systems must adapt at the same rate or faster to ward off this evolving threat, otherwise the criminals will eventually win. Organisations...
Read More“If you can measure it, you can manage it.” Whether you are a senior executive or part of a risk and compliance audit team, you need to have visibility of your organisation’s cyber security posture. Understanding vulnerabilities using a security...
Read MoreSecurity teams have relied on signature-based threat detection since the earliest days of the Internet, however, signatures alone have been for some time considered second best to a more intelligence based approach to fighting cybercrime. Threat hunting...
Read MoreCyber security operations require an automated response to keep up with threats. This blog looks at the three pillars of cyber security automation and gives insight into how they help sustain cyber resilience.
Read MoreThis year’s RSA conference in San Francisco felt somewhat schizophrenic, with two distinct personalities coming through. The wise voice of reason came through first, suggesting vulnerability management and risk management should be our focus, while...
Read MoreNo one can deny that cyber security professionals are in high demand. Mounting pressure to fill large numbers of vacancies in the industry is seeing under-qualified and inexperienced candidates landing well-paid jobs because no one else is available....
Read More