What is Log Management? Log management refers to real-time alerting, collecting, storing, putting together, and analysing data from differing programs and applications. The data is referred to as log data. Log data is a computer-generated file (or the data within the file) written to every time-specific event in a controlling application (or program). Going one […]
find out moreOn January 24th 2022, the NCSC (National Cyber Security Centre) and IASME implemented an updated set of requirements for Cyber Essentials. This update is the most significant overhaul of the scheme’s technical controls since it launched in 2014. The change comes in response to the cybersecurity challenges organisations have faced in the last seven years to ensure the […]
Find out moreSapphire has designed its UK-based Security Operations Centre (SOC) to help organisations respond quickly to threats and receive the optimum cyber security protection available today. Organisations across the UK benefit from Sapphire’s twenty-five years of experience from network monitoring to vulnerability management and incident response. Sapphire security analysts have a wealth of knowledge.
Find out moreWhen a device connects to business networks, cybercriminals may use this connection to compromise corporate data and put the network at risk. This means that these endpoint devices need to be fully secured to prevent any potential incidents from happening. To do this, organisations must ensure that they are utilising appropriate solutions to protect the front line of their cybersecurity
Find out more‘What are the differences between these three types of detection and response?’ Unlike legacy security tools, network detection and response don’t rely on signature-based security tools. They often can’t detect new cyber attacks unless these signatures have already been recognised as cyber attacks on a network. However, NDR works to monitor and analyse networks via built-in response capabilities.
Find out moreThere are a variety of routes whereby a bad actor can gain unauthorised access to an organisation’s systems. They range from telephony solutions, modems, ISDN and DSL, to name a few. These systems are used for various business purposes, including; support for remote and home working by staff, dedicated connections with organisation partners and suppliers, access to public networks (e.g. Internet) and third-party networks.
Find out moreA threat hunting service uses gathered and processed intelligence to carry out a thorough, system-wide search for specific threats. In simple terms, threat hunting is the process of proving or disproving hypotheses of identified threats across an organisation’s environment. One example of threat hunting would be a threat hunter team – using indicators of compromise (IOCs) to begin investigating evidence of a threat actor’s activity within an organisation’s network.
Find out moreAt Sapphire, we believe that bringing and working together with people of all backgrounds can help us generate ideas or perspectives that aid the delivery of our innovative services. Hosted by the SBRC (Scottish Business Resilience Centre), the Scottish Cyber Awards celebrate innovation and cybersecurity achievement. Sapphire sponsored the Diversity Champion award in which colleagues in public, private and charity sectors showcased their important work.
Find out moreISO 27001 is a standard set out by the International Standards Organisation that helps your organisation to manage the security of your information assets (electronic/paper, reputational, applications, infrastructure, third parties, etc.). Additionally, the certification helps organisations formulate an Information Security Management System (ISMS) to mitigate the growing number of information and cyber attacks.
Find out moreOWASP selected eight of the ten categories from contributed data and two categories from the Top 10 community survey at a high level. AppSec (Application security) researchers attempt to find new vulnerabilities and new ways to test for them. Because of the nature of the testing, it takes time to integrate these tests into tools and processes.
Find out moreSecurity awareness training objective is to ensure that employees understand the role they can play in helping to enhance and enforce the organisations’ security. From understanding data protection requirements to being able to spot the telltale signs of a phishing email, your employees are your first and foremost defence against a security breach.
Find out moreDuring the worst of the covid crisis, organisations implemented many security strategies to deal with the new way of working in the short term. Therefore, they executed them as one-off projects to cover all bases. However, after covid lockdowns, organisations have found a need for long-term strategies for cyber security.
Find out more