Get in Touch Close Menu
Log Management and Log Management Best Practices
10 February 2022

What is Log Management? Log management refers to real-time alerting, collecting, storing, putting together, and analysing data from differing programs and applications.  The data is referred to as log data. Log data is a computer-generated file (or the data within the file) written to every time-specific event in a controlling application (or program). Going one […]

find out more
Cyber essentials certification updates
2 February 2022

On January 24th 2022, the NCSC (National Cyber Security Centre) and IASME implemented an updated set of requirements for Cyber Essentials.  This update is the most significant overhaul of the scheme’s technical controls since it launched in 2014. The change comes in response to the cybersecurity challenges organisations have faced in the last seven years to ensure the […]

Find out more
Outsource Cybersecurity: Expectations vs Reality
12 January 2022

Sapphire has designed its UK-based Security Operations Centre (SOC) to help organisations respond quickly to threats and receive the optimum cyber security protection available today. Organisations across the UK benefit from Sapphire’s twenty-five years of experience from network monitoring to vulnerability management and incident response. Sapphire security analysts have a wealth of knowledge.

Find out more
How do Endpoint Security Solutions Secure Data?
7 January 2022

When a device connects to business networks, cybercriminals may use this connection to compromise corporate data and put the network at risk. This means that these endpoint devices need to be fully secured to prevent any potential incidents from happening. To do this, organisations must ensure that they are utilising appropriate solutions to protect the front line of their cybersecurity

Find out more
Endpoint Protection: What is NDR, EDR & XDR?
30 December 2021

‘What are the differences between these three types of detection and response?’ Unlike legacy security tools, network detection and response don’t rely on signature-based security tools. They often can’t detect new cyber attacks unless these signatures have already been recognised as cyber attacks on a network. However, NDR works to monitor and analyse networks via built-in response capabilities.  

Find out more
Types of Penetration Testing
29 December 2021

There are a variety of routes whereby a bad actor can gain unauthorised access to an organisation’s systems. They range from telephony solutions, modems, ISDN and DSL, to name a few. These systems are used for various business purposes, including; support for remote and home working by staff, dedicated connections with organisation partners and suppliers, access to public networks (e.g. Internet) and third-party networks.

Find out more
Threat Intelligence vs Threat Hunting
15 December 2021

A threat hunting service uses gathered and processed intelligence to carry out a thorough, system-wide search for specific threats. In simple terms, threat hunting is the process of proving or disproving hypotheses of identified threats across an organisation’s environment. One example of threat hunting would be a threat hunter team – using indicators of compromise (IOCs) to begin investigating evidence of a threat actor’s activity within an organisation’s network.  

Find out more
Supporting others to become cyber resilient
9 December 2021

At Sapphire, we believe that bringing and working together with people of all backgrounds can help us generate ideas or perspectives that aid the delivery of our innovative services. Hosted by the SBRC (Scottish Business Resilience Centre), the Scottish Cyber Awards celebrate innovation and cybersecurity achievement. Sapphire sponsored the Diversity Champion award in which colleagues in public, private and charity sectors showcased their important work.

Find out more
ISO 27001 Certification: Now is the Time to Consider the Benefits
19 November 2021

ISO 27001 is a standard set out by the International Standards Organisation that helps your organisation to manage the security of your information assets (electronic/paper, reputational, applications, infrastructure, third parties, etc.). Additionally, the certification helps organisations formulate an Information Security Management System (ISMS) to mitigate the growing number of information and cyber attacks.

Find out more
What does the OWASP 10 mean?
18 November 2021

OWASP selected eight of the ten categories from contributed data and two categories from the Top 10 community survey at a high level. AppSec (Application security) researchers attempt to find new vulnerabilities and new ways to test for them. Because of the nature of the testing, it takes time to integrate these tests into tools and processes.

Find out more
What is Cyber Security Awareness Training?
8 November 2021

Security awareness training objective is to ensure that employees understand the role they can play in helping to enhance and enforce the organisations’ security. From understanding data protection requirements to being able to spot the telltale signs of a phishing email, your employees are your first and foremost defence against a security breach.

Find out more
Zero Trust: Agility in Authentication
3 November 2021

During the worst of the covid crisis, organisations implemented many security strategies to deal with the new way of working in the short term. Therefore, they executed them as one-off projects to cover all bases. However, after covid lockdowns, organisations have found a need for long-term strategies for cyber security.   

Find out more