Much of today’s log management is still done using Syslog, which has roots in the 80s and was used without authoritative published specifications. Of course, it is also one of the most versatile tools that makes it easier for administrators to manage complex networks. To get the most out of Syslog, you should understand how […]
find out moreA Financial Services and Technology organisation takes a robust approach to secure its data, infrastructure, assets, and people, with stringent information security policies and procedures and a comprehensive security architecture comprising best-of-breed technical solutions.
Find out moreFor many organisations, cybersecurity is a priority for their in-house IT team and security operations teams still function as part of IT, whereas others are separated into their organisation.
Find out moreTo support its continued growth, a Fintech organisation wanted to show prospective clients evidence of its security maturity while protecting its infrastructure and achieving regulatory compliance with the Financial Conduct Authority (FCA).
Find out moreSecurity awareness training objective is to ensure that employees understand the role they can play in helping to enhance and enforce the organisations’ security. From understanding data protection requirements to being able to spot the telltale signs of a phishing email, your employees are your first and foremost defence against a security breach.
Find out moreThe ability to detect and respond to threats quickly and effectively is crucial for maintaining the health and security of the hardware, networks and software maintaining the confidentiality, integrity and availability of enterprise, data and software assets in your business.
Find out moreSeveral high-profile organisations, including Cisco Talos, Microsoft, and Uber, have been breached by threat actors who have successfully utilised this technique. Whilst MFA plays a significant part in strengthening an organisation’s cybersecurity posture, it is not a ‘silver bullet’.
Find out moreWith the rapid changes in how organisations work driven by external factors such as COVID-19 and rapid demands placed on IT teams, the potential for vulnerabilities to occur has increased. This has raised the associated risk of becoming a victim of high-impact cyber-attacks.
Find out moreThere are two options for organisations to manage and protect to their systems from threats.
The first is in-house security management. An in-house option is one where you have a dedicated team or person responsible for managing your cybersecurity. Ordinarily, in-house staff would be led by a Head of IT or Chief Information Security Officer (CISO) (or similar).
The other option is outsourcing your cybersecurity as a managed service.
Find out moreIncreasing the scale of your cybersecurity is not easy. After all, cybersecurity is not just about prevention. With cyber-attacks part of our world, organisations must be prepared to respond effectively to threat actors. One such way of preparing and responding is through endpoint detection and response (EDR) and or Managed EDR solutions. Organisations use EDR […]
Find out moreSapphire has designed its UK-based Security Operations Centre (SOC) to help organisations respond quickly to threats and receive the optimum cyber security protection available today. Organisations across the UK benefit from Sapphire’s twenty-five years of experience from network monitoring to vulnerability management and incident response. Sapphire security analysts have a wealth of knowledge.
Find out moreA threat hunting service uses gathered and processed intelligence to carry out a thorough, system-wide search for specific threats. In simple terms, threat hunting is the process of proving or disproving hypotheses of identified threats across an organisation’s environment. One example of threat hunting would be a threat hunter team – using indicators of compromise (IOCs) to begin investigating evidence of a threat actor’s activity within an organisation’s network.
Find out more