Blog

24 Results / Page 1 of 3

Google Chronicle: solving the three main security data challenges that enterprises face today

today13 August 2020

  • 145
close

Blog Douglas Mulvihill

Google Chronicle: solving the three main security data challenges

Google Chronicle: solving the three main security data challenges that enterprises face today Published: 10th August Google Chronicle solves the three main security data challenges that enterprises face today. Those of scalability, visibility and cost. With a multitude of security solutions being deployed within an enterprise, the rich security telemetry ...

How Cyberseer detect Burpsuite using the Darktrace

today6 August 2020

  • 133
close

Blog Douglas Mulvihill

How Cyberseer detect Burpsuite using the Darktrace

How Cyberseer detect Burpsuite using the Darktrace Published: 5th August Burpsuite is a graphical tool for testing Web application security and vulnerabilities that can be used for penetration testing. It’s a framework which allows an adversary not only to carry out reconnaissance but also gives them the ability to intercept ...

Why is visibility so important in today’s new norm of remote working?

today8 July 2020

  • 117
  • 1
Featuredstar
close

Blog Douglas Mulvihill

Why is visibility so important in today’s new norm of remote working?

Why is visibility so important in today’s new norm of remote working? In the wake of COVID-19 we now have new breeds of remote workers. Businesses have always had a small proportion of remote workers however, pre COVID-19 these were normally field based personnel connecting to specific corporate applications and ...

Discoveries made by the Cyberseer SOC

today8 July 2020

  • 87
  • 2
close

Blog Douglas Mulvihill

Discoveries made by the Cyberseer SOC

Discoveries made by the Cyberseer SOC Published: 8th July RIG Exploit Kit (RigEK) Industry Sector: Financial Threat source: External Cyberseer utilises machine learning models to detect a device behaving abnormally. Analysts monitoring for this activity discovered a corporate device beaconing to a newly generated domain. The suspect device was being ...

What are Cloud Security and Posture Management tools?

today24 June 2020

  • 86
close

Blog Douglas Mulvihill

What are Cloud Security and Posture Management tools?

What are Cloud Security and Posture Management tools? Published 24th June 2020 In 2019 Gartner published their report which recommended that security leaders invest in cloud security and posture management tools. The aim of CSPM tools is to identify and remediate the risks of misconfiguration, mismanagement, and mistakes. Over the ...

Securing the Cloud Infrastructure: Native vs Cloud Control

today24 June 2020

  • 93
  • 2
close

Blog Douglas Mulvihill

Securing the Cloud Infrastructure: Native vs Cloud Control

Securing the Cloud Infrastructure: Native vs Cloud Control Published 23rd June As the number of enterprises moving to the cloud exponentially grows. There has been an inevitable rise in cloud security breaches. Despite this rise enterprises still fail to understand the need to implement a future proof cloud security solution. ...

Google Chronicle: The forward-thinking solution for threat hunting

today13 June 2020

  • 52
close

Blog Douglas Mulvihill

Google Chronicle: The forward-thinking solution for threat hunting

Google Chronicle: The forward-thinking solution for threat hunting Chronicle is a new threat hunting platform, developed by Google. Leveraging Google, Cloud and Threat Feed technologies it provides analysts the ability to deep dive into accessible and enriched logs. It gives companies 12 months of hot storage with sub-second search ability. ...

De stress your security staff with an advanced SOC?

today9 February 2020

  • 156
  • 1
close

Blog Douglas Mulvihill

De stress your security staff with an advanced SOC?

De stress your security staff with an advanced SOC? Published: 9th February 2020 Many factors affect the ability for and organisation to remain secure, including an exponential increase in log data due to the adoption of cloud operating models, endpoint monitoring and more reliance being placed on online applications. The ...

Blog Reasons for MSSP's to Detect Security Incidents

today7 May 2019

  • 489
Featuredstar
close

Blog Elizabeth Gladen

8 Reasons for Detecting & Investigating Security Incidents with a Managed Security Provider

8 Reasons for Detecting & Investigating Security Incidents with a Managed Security Provider The threat landscape is continually evolving affecting all types of business that embrace and rely on technology to continue their day to day operations. The explosion of cloud-based applications and services coupled with initiatives such as Bring ...