Blog

28 Results / Page 1 of 4

Infographic Five ways to boost your threat detection capability and capacity

today11 May 2021

  • 56
  • 1
Featuredstar
close

Blog + Infographic Elizabeth Gladen

Infographic – The Threat From Within: Five steps to boost your threat detection

Infographic: Threats From Within: Five Ways to Boost Your Detection Capability & Capacity This infographic explores five ways to boost your detection capability and capacity: Know what to look for Employ zero trust Bring in the big guns Focus on reducing time to detection Get real-time threat detection For more ...

Cyberseer threat findings report

today19 February 2021

  • 295
Featuredstar
close

Resources + Blog Elizabeth Gladen

Cyberseer Threat Findings Report

Cyberseer Threat Findings Report Published: 19th February Keeping your business safe is your number one priority. It’s ours too. Fusing advanced threat detection technologies with deep forensic expertise, we help you join all the dots to rapidly distel threats. Our innovative solutions give you all the confidence and proactive control ...

Cyberseer Annual Review 2020

today16 February 2021

  • 318
Featuredstar
close

Resources + Blog Elizabeth Gladen

Cyberseer Annual Review

Cyberseer Annual Review Published: 15th February 2020 was a year to remember for all the wrong reasons. Organisations were forced to immediately change to new ways of working and interacting with users and consumers. In this report, Cyberseer reviews the issues of 2020: Cloud Transformation The Remote Workforce Cybercrime Supply ...

Covid-19 Coronavirus Changes Cyber Security Forever

today6 November 2020

  • 208
close

Blog + Infographic Elizabeth Gladen

Covid-19 Dramatically Changes Cyber Security Forever

Covid-19 Dramatically Changes Cyber Security Forever Published: 6th November The pandemic has set huge challenges for organisations worldwide. Overnight, organisations have had to rapidly transform just to function, and the demand on digital infrastructures have skyrocketed. Some organisations kept continuity by shifting business entirely online, creating demand for virtual processes ...

Google Chronicle: solving the three main security data challenges that enterprises face today

today13 August 2020

  • 201
close

Blog Elizabeth Gladen

Google Chronicle: solving the three main security data challenges

Google Chronicle: solving the three main security data challenges that enterprises face today Published: 10th August Google Chronicle solves the three main security data challenges that enterprises face today. Those of scalability, visibility and cost. With a multitude of security solutions being deployed within an enterprise, the rich security telemetry ...

How Cyberseer detect Burpsuite using the Darktrace

today6 August 2020

  • 157
  • 1
close

Blog Elizabeth Gladen

How Cyberseer detect Burpsuite using the Darktrace

How Cyberseer detect Burpsuite using the Darktrace Published: 5th August Burpsuite is a graphical tool for testing Web application security and vulnerabilities that can be used for penetration testing. It’s a framework which allows an adversary not only to carry out reconnaissance but also gives them the ability to intercept ...

Why is visibility so important in today’s new norm of remote working?

today8 July 2020

  • 146
  • 1
Featuredstar
close

Blog Elizabeth Gladen

Why is visibility so important in today’s new norm of remote working?

Why is visibility so important in today’s new norm of remote working? In the wake of COVID-19 we now have new breeds of remote workers. Businesses have always had a small proportion of remote workers however, pre COVID-19 these were normally field based personnel connecting to specific corporate applications and ...

Discoveries made by the Cyberseer SOC

today8 July 2020

  • 158
  • 4
close

Blog Elizabeth Gladen

Discoveries made by the Cyberseer SOC

Discoveries made by the Cyberseer SOC Published: 8th July RIG Exploit Kit (RigEK) Industry Sector: Financial Threat source: External Cyberseer utilises machine learning models to detect a device behaving abnormally. Analysts monitoring for this activity discovered a corporate device beaconing to a newly generated domain. The suspect device was being ...

What are Cloud Security and Posture Management tools?

today24 June 2020

  • 177
close

Blog Elizabeth Gladen

What are Cloud Security and Posture Management tools?

What are Cloud Security and Posture Management tools? Published 24th June 2020 In 2019 Gartner published their report which recommended that security leaders invest in cloud security and posture management tools. The aim of CSPM tools is to identify and remediate the risks of misconfiguration, mismanagement, and mistakes. Over the ...