Skip to content
The image displays the word "SAPPHIRE" in all capital letters using a bold, modern font. The text is white and set against a dark background.
  • Professional ServicesExpand
    • Identify

      Governance, risk & Compliance
      Third Party Risk Management (TPRM)
      Testing & Vulnerability Analysis
      Gap Analysis
      Security Improvement Plan (SIP)
      Breach Attack Simulation

      Protect

      Perimeter Security
      Email & Web Security
      Identity & Access Management
      Malware Protection
      Security Improvement & Remediation Service

      Detect & Respond

      Managed Threat Intelligence
      Cyber Incident Response
      Security Awareness Training

      Recover

      Security Consultancy
      Digital Forensics

      Operational Technology

      Operational Technology (OT) Security
      IT/OT SOC
      Training

  • Managed ServicesExpand
    • Managed Services

      Security Training & Awareness
      XDR for Microsoft
      Managed Detection & Response
      Vulnerability Management
      Incidence Response
      Threat Intelligence
      Managed Firewall
      Managed Services
      Request a call back
  • News & EventsExpand
    • Blogs & Press Releases
      Webinars & Events
  • About Us
  • NISC
Contact
The image displays the word "SAPPHIRE" in all capital letters using a bold, modern font. The text is white and set against a dark background.

Author: Alan Moffat

2025 News Bytes
Blogs & Press Releases

2025 News Bytes

ByAlan Moffat March 28, 2025March 28, 2025

March 2025 Newsletter ByBit Breach The FBI has identified North Korea as being behind the theft of approximately $1.5 billion of virtual assets (ETH) from the ByBit cryptocurrency exchange, making it the largest heist in…

Read More 2025 News BytesContinue

2025 Threat Spotlight
Blogs & Press Releases

2025 Threat Spotlight

ByAlan Moffat March 28, 2025March 28, 2025

North Korean Insider Threats March 2025: The rise in infiltrating organisations by embedding operatives as external consultants has increased significantly since the end of 2024 into 2025. North Korea is seen as the main exponent…

Read More 2025 Threat SpotlightContinue

The Impact of Artificial Intelligence on Supply Chain Security
Blogs & Press Releases

The Impact of Artificial Intelligence on Supply Chain Security

ByAlan Moffat March 27, 2025March 27, 2025

Incorporating Artificial Intelligence (AI) into supply chain security is a game changer, streamlining and securing supply chains, but also introducing new risks that need careful navigation. AI is reshaping supply chains, predicting disruptions, and mitigating…

Read More The Impact of Artificial Intelligence on Supply Chain SecurityContinue

Supply Chain Risk Management v Third Party Risk Management
Blogs & Press Releases

Supply Chain Risk Management v Third Party Risk Management

ByAlan Moffat March 20, 2025April 2, 2025

The challenge of managing risks within supply chains and third-party relationships has never been more critical. Supply Chain Risk Management (SCRM) and Third Party Risk Management (TPRM) are two practices at the forefront of addressing…

Read More Supply Chain Risk Management v Third Party Risk ManagementContinue

Blogs & Press Releases

Sapphire SOC Urgent Advisory – Crowdstrike

ByAlan Moffat July 19, 2024July 19, 2024

To all Sapphire customers,   Sapphire has been made aware of a recent widespread issue that has been reported: Windows machines are experiencing crashes and displaying the Blue Screen of Death (BSOD). Currently, all indicators are…

Read More Sapphire SOC Urgent Advisory – CrowdstrikeContinue

Mastering Supply Chain Risks for Enhanced Cyber Security
Blogs & Press Releases

Mastering Supply Chain Risks for Enhanced Cyber Security

ByAlan Moffat May 16, 2024May 16, 2024

Supply chains are large, complex networks of interconnected systems, processes, and people that facilitate the flow of goods, services, and information from their source to end-user destinations. Across supply chains, various processes such as sourcing,…

Read More Mastering Supply Chain Risks for Enhanced Cyber SecurityContinue

CIS  Controls
Blogs & Press Releases

CIS Controls

ByAlan Moffat October 18, 2023May 9, 2024

Are you troubled about the security of your organisation’s data and systems? Cyber threats are becoming more sophisticated daily, and a robust cyber security posture is more important than ever. The consequences of cyber attacks…

Read More CIS ControlsContinue

Contact
About
Insights
NISC

Identify

Compliance and Risk
Gap Analysis
Security Improvement Plan (SIP)
Testing & Vulnerability Analysis
Breach Attack Simulation


Protect

Perimeter Security
Email & Web Security
Identity & Access Management
Malware Protection

Detect & Respond

XDR for Microsoft
Managed Detection & Response
Threat Intelligence
Vulnerability Management
Security Awareness Training
Cyber Incident Response

Recover

Security Consultancy
Digital Forensics

Email: support@sapphire.net
Registered Office: The Cube, Barrack Road, Newcastle upon Tyne, NE4 6DB
Phone: +448455827001

A white silhouette of a lion holding a Union Jack flag on a black background. Above the lion is a crown, and below it, the text "Armed Forces Covenant" is displayed in uppercase letters. Ideal for use in website structure or page layout as an emblematic footer element.

privacy & Legal

Cookies

Terms & Conditions

©2024

Linkedin
Facebook
Twitter

Contact
About
Insights
NISC

Gap Analysis
Security Improvement Plan (SIP)
Testing & Analysis
Breach attack simulation

Perimeter security
Email & Web Security
Identity & Access management
Malware protection

XDR for Microsoft
Managed Detection & Response
Threat Intelligence
Vulnerability Management
Security Awareness Training
Cyber incident response

Security Consultancy
Digital forensics

LinkedIn
Facebook
Twitter
A white silhouette of a lion holding a Union Jack flag on a black background. Above the lion is a crown, and below it, the text "Armed Forces Covenant" is displayed in uppercase letters. Ideal for use in website structure or page layout as an emblematic footer element.

privacy & Legal

Cookies

©2024

Had an incident? Call: 0845 582 7247

Please enable JavaScript in your browser to complete this form.
- Step 1 of 2

Enter Your Email to Access Content

Name *
Loading
Please enable JavaScript in your browser to complete this form.
Name *
Which courses are you interested in? *
Loading

Search
  • Professional Services
    • Identity
      • Governance, Risk and Compliance
      • Third-Party Risk Management (TPRM)
      • Testing & Vulnerability Analysis
      • Gap Analysis
      • Security Improvement Plan (SIP)
      • Breach Attack Simulation
    • Protect
      • Perimeter Security
      • Email & Web Security Services
      • Identity & Access Management
      • Malware Protection
      • Security Improvement and Remediation Service
    • Detect & Respond
      • Managed Threat Intelligence
      • Cyber Incident Response
      • Security Awareness Training
    • Recover
      • Security Consultancy Services 
      • Digital Forensics
    • Operational Technology
      • Operational Technology (OT) Security
      • IT/OT SOC
      • Training
  • Managed Services
    • Security Awareness Training
    • XDR for Microsoft
    • Managed Detection & Response
    • Vulnerability Management
    • Incident Response
    • Threat Intelligence
    • Managed Firewall
  • News & Events
    • Blogs & Press Releases
    • Webinars & Events
  • About us
  • NISC
contact
Search