Blog

25 Results / Page 1 of 3

Covid-19 Coronavirus Changes Cyber Security Forever

today6 November 2020

  • 189
close

Blog + Infographic Elizabeth Gladen

Covid-19 Dramatically Changes Cyber Security Forever

Covid-19 Dramatically Changes Cyber Security Forever Published: 6th November The pandemic has set huge challenges for organisations worldwide. Overnight, organisations have had to rapidly transform just to function, and the demand on digital infrastructures have skyrocketed. Some organisations kept continuity by shifting business entirely online, creating demand for virtual processes ...

Google Chronicle: solving the three main security data challenges that enterprises face today

today13 August 2020

  • 179
close

Blog Elizabeth Gladen

Google Chronicle: solving the three main security data challenges

Google Chronicle: solving the three main security data challenges that enterprises face today Published: 10th August Google Chronicle solves the three main security data challenges that enterprises face today. Those of scalability, visibility and cost. With a multitude of security solutions being deployed within an enterprise, the rich security telemetry ...

How Cyberseer detect Burpsuite using the Darktrace

today6 August 2020

  • 151
  • 1
close

Blog Elizabeth Gladen

How Cyberseer detect Burpsuite using the Darktrace

How Cyberseer detect Burpsuite using the Darktrace Published: 5th August Burpsuite is a graphical tool for testing Web application security and vulnerabilities that can be used for penetration testing. It’s a framework which allows an adversary not only to carry out reconnaissance but also gives them the ability to intercept ...

Why is visibility so important in today’s new norm of remote working?

today8 July 2020

  • 131
  • 1
Featuredstar
close

Blog Elizabeth Gladen

Why is visibility so important in today’s new norm of remote working?

Why is visibility so important in today’s new norm of remote working? In the wake of COVID-19 we now have new breeds of remote workers. Businesses have always had a small proportion of remote workers however, pre COVID-19 these were normally field based personnel connecting to specific corporate applications and ...

Discoveries made by the Cyberseer SOC

today8 July 2020

  • 105
  • 2
close

Blog Elizabeth Gladen

Discoveries made by the Cyberseer SOC

Discoveries made by the Cyberseer SOC Published: 8th July RIG Exploit Kit (RigEK) Industry Sector: Financial Threat source: External Cyberseer utilises machine learning models to detect a device behaving abnormally. Analysts monitoring for this activity discovered a corporate device beaconing to a newly generated domain. The suspect device was being ...

What are Cloud Security and Posture Management tools?

today24 June 2020

  • 112
close

Blog Elizabeth Gladen

What are Cloud Security and Posture Management tools?

What are Cloud Security and Posture Management tools? Published 24th June 2020 In 2019 Gartner published their report which recommended that security leaders invest in cloud security and posture management tools. The aim of CSPM tools is to identify and remediate the risks of misconfiguration, mismanagement, and mistakes. Over the ...

Securing the Cloud Infrastructure: Native vs Cloud Control

today24 June 2020

  • 108
  • 2
close

Blog Elizabeth Gladen

Securing the Cloud Infrastructure: Native vs Cloud Control

Securing the Cloud Infrastructure: Native vs Cloud Control As the number of enterprises moving to the cloud exponentially grows. There has been an inevitable rise in cloud security breaches. Despite this rise enterprises still fail to understand the need to implement a future proof cloud security solution. At Cyberseer we ...

Google Chronicle: The forward-thinking solution for threat hunting

today13 June 2020

  • 83
close

Blog Elizabeth Gladen

Google Chronicle: The forward-thinking solution for threat hunting

Google Chronicle: The forward-thinking solution for threat hunting Chronicle is a new threat hunting platform, developed by Google. Leveraging Google, Cloud and Threat Feed technologies it provides analysts the ability to deep dive into accessible and enriched logs. It gives companies 12 months of hot storage with sub-second searchability. It ...

De stress your security staff with an advanced SOC?

today9 February 2020

  • 164
  • 1
close

Blog Elizabeth Gladen

De stress your security staff with an advanced SOC?

De stress your security staff with an advanced SOC? Published: 9th February 2020 Many factors affect the ability for and organisation to remain secure, including an exponential increase in log data due to the adoption of cloud operating models, endpoint monitoring and more reliance being placed on online applications. The ...