Sapphire’s SOC Team have been tracking a recent Crypto Mining campaign targeting Linux systems, utilising a proof-of-concept (PoC) hack tool hosted on GitHub known as ‘CHAOS’.
find out moreLike all organisations, Sapphire Utility Solutions (SUS) is a target for cybercriminals. This is only exasperated by its rapid growth.
Whilst having extensive security experience within the team, SUS wanted to enhance its cybersecurity capabilities and provide the best resources for its team to take advantage of, so it decided to outsource its cybersecurity via Sapphire’s Managed Security service.
Find out moreFor protecting endpoints such as workstations and servers, antivirus protection has been the traditional go-to. However, with Endpoint Protection and Response (EDR), next-generation protection is available to organisations.
Find out moreFor many organisations, cybersecurity is a priority for their in-house IT team and security operations teams still function as part of IT, whereas others are separated into their organisation.
Find out moreCyber insurance, commonly referred to as cyber-liability insurance, is a type of insurance that aids in shielding organisations from the repercussions of hacking and cyberattacks. Cyber insurance can minimise the organisation disruption caused by a cyber incident and its aftermath with the help of cyber insurance policy coverage. It can also potentially cover some of the associated costs.
Find out moreTo support its continued growth, a Fintech organisation wanted to show prospective clients evidence of its security maturity while protecting its infrastructure and achieving regulatory compliance with the Financial Conduct Authority (FCA).
Find out moreThe ability to detect and respond to threats quickly and effectively is crucial for maintaining the health and security of the hardware, networks and software maintaining the confidentiality, integrity and availability of enterprise, data and software assets in your business.
Find out moreSeveral high-profile organisations, including Cisco Talos, Microsoft, and Uber, have been breached by threat actors who have successfully utilised this technique. Whilst MFA plays a significant part in strengthening an organisation’s cybersecurity posture, it is not a ‘silver bullet’.
Find out moreAlerting is essential to cybersecurity. However, alerting can also be an overwhelming aspect of cybersecurity. A never-ending set of alerts that require investigating can cause alert overload. So how do you reduce security alert fatigue? An effective Managed Security Information and Events Management (SIEM) system, paired with the skill set of a 24/7 Security Operations […]
Find out moreIn the past, security professionals relied on traditional perimeter security such as firewalls to prevent unwanted access to their data; however, this has become progressively irrelevant in today’s modern landscape due the adoption of cloud first strategies and flexible working approach which in turn has blurred the line as to where that perimeter actually exists.
The pandemic and cloud-first technologies have expedited this move to an extended perimeter which has driven cybersecurity professionals to prioritise a Zero-Trust strategy throughout many organisations.
Find out moreSOCs (Security Operations Centre) are cross-functional, which helps centralise operations carried out by different departments within an organisation. This means that they provide value to organisation stakeholders and help meet agendas.
SOC analysts play a critical role in taking responsibility for security incidents and assisting in communications on security incidents.
Find out moreIncreasing the scale of your cybersecurity is not easy. After all, cybersecurity is not just about prevention. With cyber-attacks part of our world, organisations must be prepared to respond effectively to threat actors. One such way of preparing and responding is through endpoint detection and response (EDR) and or Managed EDR solutions. Organisations use EDR […]
Find out more