Skip to content
The image displays the word "SAPPHIRE" in all capital letters using a bold, modern font. The text is white and set against a dark background.
  • Professional ServicesExpand
    • Identify

      Governance, risk & Compliance
      Third Party Risk Management (TPRM)
      Testing & Vulnerability Analysis
      Gap Analysis
      Security Improvement Plan (SIP)
      Breach Attack Simulation

      Protect

      Perimeter Security
      Email & Web Security
      Identity & Access Management
      Malware Protection
      Security Improvement & Remediation Service

      Detect & Respond

      Managed Threat Intelligence
      Cyber Incident Response
      Security Awareness Training

      Recover

      Security Consultancy
      Digital Forensics

      Operational Technology

      Operational Technology (OT) Security
      IT/OT SOC
      Training

  • Managed ServicesExpand
    • Managed Services

      Security Training & Awareness
      XDR for Microsoft
      Managed Detection & Response
      Vulnerability Management
      Incidence Response
      Threat Intelligence
      Managed Firewall
      Managed Services
      Request a call back
  • News & EventsExpand
    • Blogs & Press Releases
      Webinars & Events
  • About Us
  • NISC
Contact
The image displays the word "SAPPHIRE" in all capital letters using a bold, modern font. The text is white and set against a dark background.

Author: Jacky

Blogs & Press Releases

OWASP Application Security Verification Standard (ASVS)

ByJacky October 18, 2023May 21, 2024

As technology advances and improves, so does the need to ensure that our systems and applications are secure from malicious attacks. The Open Web Application Security Project (OWASP) Application Security Verification Standard (ASVS) is a…

Read More OWASP Application Security Verification Standard (ASVS)Continue

Blogs & Press Releases

What is Pretexting? Social Engineering Cyber Attack

ByJacky October 18, 2023May 21, 2024

Do you ever receive suspicious phone calls, fraudulent texts, or emails asking for personal information from strangers? Or perhaps you’ve received a message from your bank or financial institution asking you to confirm your account…

Read More What is Pretexting? Social Engineering Cyber AttackContinue

Blogs & Press Releases

Advanced Persistent Threat (APT) Testing: Detailed Guide

ByJacky October 18, 2023May 21, 2024

Nowadays, targeted and opportunistic cyberattacks occur more often and with greater sophistication. You may encounter dangers like insider threats, supply chain attacks, ransomware, and cyber fraud. Fortunately, you can test the effectiveness of your cyber…

Read More Advanced Persistent Threat (APT) Testing: Detailed GuideContinue

Blogs & Press Releases

Information Security Spend Growth From 2017 to 2023

ByJacky October 18, 2023May 21, 2024

Information security products and services are forecasted to grow 11%+ to reach more than $180 billion in 2023.  At Sapphire, we are committed to addressing the rising concerns surrounding online privacy and security. With the…

Read More Information Security Spend Growth From 2017 to 2023Continue

Blogs & Press Releases

Dictionary Attacks: How They Work and How to Stop Them

ByJacky October 18, 2023May 21, 2024

Are you aware that weak passwords are one of your biggest cybersecurity threats? According to studies, 81% of data breaches occur due to easily guessable passwords. So, one of the most common methods hackers use to crack…

Read More Dictionary Attacks: How They Work and How to Stop ThemContinue

Blogs & Press Releases

InsightVM: A Guide to Effective Vulnerability Management

ByJacky October 18, 2023May 21, 2024

Cybersecurity risks and threats are becoming more complex, and attackers are more sophisticated in today’s fast-paced technological world. With the rise of remote work, cloud computing, and the Internet of Things (IoT), organizations face many…

Read More InsightVM: A Guide to Effective Vulnerability ManagementContinue

Blogs & Press Releases

CVE 2022 21500: Understanding the Critical Vulnerability

ByJacky October 18, 2023May 21, 2024

Are you aware that an easily exploitable vulnerability known as CVE 2022 21500 has been discovered that poses a significant threat to organisations and individuals worldwide? This vulnerability could potentially allow attackers to gain unauthorised…

Read More CVE 2022 21500: Understanding the Critical VulnerabilityContinue

Blogs & Press Releases

Guide to Apache Log4j CVE 2021 44228 Vulnerability

ByJacky October 18, 2023May 21, 2024

With cybersecurity threats becoming increasingly common and sophisticated over the years, you may be using software vulnerable to CVE 2021 44228 without ever realising it. Most people usually give little thought to installing security updates…

Read More Guide to Apache Log4j CVE 2021 44228 VulnerabilityContinue

Blogs & Press Releases

Man-in-the-Middle Attack: Prevention Best Practices and Detection

ByJacky October 18, 2023May 21, 2024

Identity-based cyber-attacks come in many forms and pose numerous risks for any organisation. One of the most common facilitators of identity-based cyber attacks is a man-in-the-middle attack (MITM). Here, it is difficult to differentiate between…

Read More Man-in-the-Middle Attack: Prevention Best Practices and DetectionContinue

Blogs & Press Releases

Bash Uploader Compromised in Supply Chain Attack

ByJacky October 18, 2023May 21, 2024

Over the last three years, there has been an alarming increase in supply chain attacks, with hospitals and clinics being the primary targets. These attacks involve hackers compromising the software’s security before getting to the…

Read More Bash Uploader Compromised in Supply Chain AttackContinue

Green Circuit Board
Blogs & Press Releases

What Is Correlation ID in Distributed Systems?

ByJacky October 18, 2023July 9, 2024

Most modern software is designed specifically for use in distributed systems. Coordinating various services and applications usually achieves a seamless experience for the end-user in these systems. However, because of the interrelated structure of multiple…

Read More What Is Correlation ID in Distributed Systems?Continue

Blogs & Press Releases

MS08.067: The Vulnerability that Shook the World

ByJacky October 18, 2023May 21, 2024

MS08.067 is a name that strikes fear in the hearts of tech professionals everywhere. This vulnerability in Microsoft’s Windows operating system has been responsible for some of the most notorious cyber-attacks of the last decade….

Read More MS08.067: The Vulnerability that Shook the WorldContinue

Blogs & Press Releases

The Implications of Cve-2021-36934 on Data Privacy

ByJacky October 18, 2023May 21, 2024

Technology is an integral part of our lives, but unfortunately, cyber threats are constantly on the rise. Recently, a new vulnerability has been discovered, known as CVE-2021-36934, which poses a significant risk to computer systems….

Read More The Implications of Cve-2021-36934 on Data PrivacyContinue

Blogs & Press Releases

Guide to Managed Detection and Response (MDR)

ByJacky October 18, 2023May 21, 2024

Managed Detection and Response (MDR) has become a critical aspect of cybersecurity for businesses of all sizes. As cyber threats evolve and become more sophisticated, organisations realise the importance of a comprehensive security strategy that…

Read More Guide to Managed Detection and Response (MDR)Continue

Blogs & Press Releases

What Is Information Security Risk Management?

ByJacky October 18, 2023May 21, 2024

The value of information has become one of the most important assets a company can possess. Similarly, collecting, processing, transmitting, and storing information has become too complex. This has increased the chances of information security…

Read More What Is Information Security Risk Management?Continue

Page navigation

Previous PagePrevious 1 2 3 4 5 … 12 Next PageNext

Contact
About
Insights
NISC

Identify

Compliance and Risk
Gap Analysis
Security Improvement Plan (SIP)
Testing & Vulnerability Analysis
Breach Attack Simulation


Protect

Perimeter Security
Email & Web Security
Identity & Access Management
Malware Protection

Detect & Respond

XDR for Microsoft
Managed Detection & Response
Threat Intelligence
Vulnerability Management
Security Awareness Training
Cyber Incident Response

Recover

Security Consultancy
Digital Forensics

Email: support@sapphire.net
Registered Office: The Cube, Barrack Road, Newcastle upon Tyne, NE4 6DB
Phone: +448455827001

A white silhouette of a lion holding a Union Jack flag on a black background. Above the lion is a crown, and below it, the text "Armed Forces Covenant" is displayed in uppercase letters. Ideal for use in website structure or page layout as an emblematic footer element.

privacy & Legal

Cookies

Terms & Conditions

©2024

Linkedin
Facebook
Twitter

Contact
About
Insights
NISC

Gap Analysis
Security Improvement Plan (SIP)
Testing & Analysis
Breach attack simulation

Perimeter security
Email & Web Security
Identity & Access management
Malware protection

XDR for Microsoft
Managed Detection & Response
Threat Intelligence
Vulnerability Management
Security Awareness Training
Cyber incident response

Security Consultancy
Digital forensics

LinkedIn
Facebook
Twitter
A white silhouette of a lion holding a Union Jack flag on a black background. Above the lion is a crown, and below it, the text "Armed Forces Covenant" is displayed in uppercase letters. Ideal for use in website structure or page layout as an emblematic footer element.

privacy & Legal

Cookies

©2024

Had an incident? Call: 0845 582 7247

Please enable JavaScript in your browser to complete this form.
- Step 1 of 2

Enter Your Email to Access Content

Name *
Loading
Please enable JavaScript in your browser to complete this form.
Name *
Which courses are you interested in? *
Loading

Search
  • Professional Services
    • Identity
      • Governance, Risk and Compliance
      • Third-Party Risk Management (TPRM)
      • Testing & Vulnerability Analysis
      • Gap Analysis
      • Security Improvement Plan (SIP)
      • Breach Attack Simulation
    • Protect
      • Perimeter Security
      • Email & Web Security Services
      • Identity & Access Management
      • Malware Protection
      • Security Improvement and Remediation Service
    • Detect & Respond
      • Managed Threat Intelligence
      • Cyber Incident Response
      • Security Awareness Training
    • Recover
      • Security Consultancy Services 
      • Digital Forensics
    • Operational Technology
      • Operational Technology (OT) Security
      • IT/OT SOC
      • Training
  • Managed Services
    • Security Awareness Training
    • XDR for Microsoft
    • Managed Detection & Response
    • Vulnerability Management
    • Incident Response
    • Threat Intelligence
    • Managed Firewall
  • News & Events
    • Blogs & Press Releases
    • Webinars & Events
  • About us
  • NISC
contact
Search