The Future of Ransomware: 2022 & Beyond

Ransomware remains one of the highest priority challenges for organisations of all sizes and across all sectors in 2022.

“Ransomware is the fastest-growing cybercrime for a reason,” says Steve Morgan, founder at Cybersecurity Ventures and editor-in-chief at Cybercrime Magazine. “It’s the proverbial get-rich-quick scheme in the minds of hackers.”

Harmony: Check Point & Avanan

Most companies have moved away from traditional in-house on-premises hosted applications like file servers, mail servers and proxy servers for cloud-based services known as Software-as-a-Service (SaaS) applications. One of the most popular SaaS platforms I have come across is Microsoft 365 Exchange Online. The cloud-based mail platform is accessible from anywhere offers no end of features, constantly evolving to meet organisational needs. Microsoft integrates its security and mail filtering capabilities into this platform.

What is the SOC (Security Operations Centre) Visibility Triad?

IT environments are becoming increasingly complex and sophisticated, and security teams are faced with the daunting task of keeping potential attackers from accessing their organisation’s environments. As a result, organisations are adopting increasingly complex cybersecurity solutions to combat this growing concern. One way to do this is by using the SOC visibility triad.

Supporting others to become cyber resilient

At Sapphire, we believe that bringing and working together with people of all backgrounds can help us generate ideas or perspectives that aid the delivery of our innovative services. Hosted by the SBRC (Scottish Business Resilience Centre), the Scottish Cyber Awards celebrate innovation and cybersecurity achievement. Sapphire sponsored the Diversity Champion award in which colleagues in public, private and charity sectors showcased their important work.

Threat Intelligence vs Threat Hunting

A threat hunting service uses gathered and processed intelligence to carry out a thorough, system-wide search for specific threats. In simple terms, threat hunting is the process of proving or disproving hypotheses of identified threats across an organisation’s environment. One example of threat hunting would be a threat hunter team – using indicators of compromise (IOCs) to begin investigating evidence of a threat actor’s activity within an organisation’s network.  

How do Endpoint Security Solutions Secure Data?

When a device connects to business networks, cybercriminals may use this connection to compromise corporate data and put the network at risk. This means that these endpoint devices need to be fully secured to prevent any potential incidents from happening. To do this, organisations must ensure that they are utilising appropriate solutions to protect the front line of their cybersecurity

What is Vulnerability Management? | Sapphire

Vulnerability management is the process of finding and patching vulnerabilities in your network security to protect an organisation’s networks against malicious cyberattacks. It is an ongoing program utilising a wide variety of technologies to identify and remediate vulnerabilities in your network to keep your organisation safe from cyber attacks.   

Types of Penetration Testing

There are a variety of routes whereby a bad actor can gain unauthorised access to an organisation’s systems. They range from telephony solutions, modems, ISDN and DSL, to name a few. These systems are used for various business purposes, including; support for remote and home working by staff, dedicated connections with organisation partners and suppliers, access to public networks (e.g. Internet) and third-party networks.