There have been many participants in Cybersecurity Awareness Month, such as DHS Secretary Janet Napolitano back in 2009. In 2010 during the STOP. THINK. CONNECT campaign, former U.S. President Barack Obama used this phrase as a national cybersecurity education and awareness message.
Cybersecurity Awareness Month has also had many themes to help articulate the different aspects of cybersecurity, such as education, cybercrime, law enforcement, mobility, critical infrastructure for any organisation from small to large.find out more
Defining a clear strategy when establishing an organisation’s SOC helps to align business goals. Developing the strategy using an assessment is the best way to identify gas and potential vulnerabilities.
After this assessment, the team can create a clear, comprehensive set of processes, helping to guide the SOC team in operating, monitoring, detecting, responding and reporting as suggested above.
As a result of the fluid and ever-evolving threat landscape, this strategy will need reviewing periodically, helping to keep ahead of any new emerging risks and vulnerabilities.Find out more
While many threat and risk management solutions help organisations deal with low-level security events with automated responses, having an incident response plan, delivered by an experienced team will determine your success in responding to an attack.Find out more
Used by organisations to detect and prevent malicious activity in an organisation, Network Detection and Response describes a category of security solutions that are used to investigate and mitigate the risk of attackers. It is a progressive security solution providing a centralised machine-based analysis of network traffic and response solutions.
NDR solutions provide a single solution for visibility across on-prem, remote, and cloud environments.Find out more
How can you ensure you have outsourced your penetration testing requirements to the right provider?Find out more
Network scanning can help organisations know what vulnerabilities are present in their network and its connected devices. Scanning your network in this way can help find current vulnerabilities and find potential security flaws. You can ensure that your organisation has the proper security controls and measures in place to prevent and best protect your network against malicious attackers.Find out more
Vulnerability management is the process of finding and patching vulnerabilities in your network security to protect an organisation’s networks against malicious cyberattacks. It is an ongoing program utilising a wide variety of technologies to identify and remediate vulnerabilities in your network to keep your organisation safe from cyber attacks.Find out more
On June 8th, 2021, Microsoft released their scheduled weekly security update; contained within this release was a patch for a Print Spooler service (spoolsv.exe) vulnerability CVE-2021-1675. The vulnerability had initially been deemed a low-risk Escalation of Privilege (EoP) exploit. However, Microsoft unexpectedly upgraded it to a high-risk Remote Code Execution vulnerability that would allow authenticated […]Find out more
Over the last year, the technological landscape has changed dramatically across the globe. More businesses than ever are investing in large and robust infrastructures, but the unfortunate truth is severe, and high-level cybersecurity weaknesses are more common today in 2021 than in 2020.Find out more
Frequently, websites have outdated software containing known security vulnerabilities this is a security risk that can be avoided. Carrying out regular software updates and ensuring that you are using the latest version of the software will typically remediate these issues by installing security patches and increasing your website security.Find out more
On May 27th, the Microsoft Threat Intelligence Centre (MSTIC) announced that ‘NOBELIUM’, the threat actor behind the SolarWinds compromise, had instigated another attack in the form of a persistent and evolving phishing campaign. Conducted in increasingly complex stages, this campaign has been active since January 2021. This is since the MSTIC first became aware of the operation.Find out more
Cyber-attacks and data breaches against organisations, and companies, are an inevitable part of our digital world. Businesses and organisations of all sizes need to emphasise their ability to quickly detect and respond to cybersecurity incidents to maintain an effective security posture. So how can a business or organisation prevent or manage a worst-case cybersecurity scenario? […]Find out more