Blog

29 Results / Page 2 of 4

What are Cloud Security and Posture Management tools?

today24 June 2020

  • 189
close

Blog Elizabeth Gladen

What are Cloud Security and Posture Management tools?

What are Cloud Security and Posture Management tools? Published 24th June 2020 In 2019 Gartner published their report which recommended that security leaders invest in cloud security and posture management tools. The aim of CSPM tools is to identify and remediate the risks of misconfiguration, mismanagement, and mistakes. Over the ...

Securing the Cloud Infrastructure: Native vs Cloud Control

today24 June 2020

  • 119
  • 5
close

Blog Elizabeth Gladen

Securing the Cloud Infrastructure: Native vs Cloud Control

Securing the Cloud Infrastructure: Native vs Cloud Control As the number of enterprises moving to the cloud exponentially grows. There has been an inevitable rise in cloud security breaches. Despite this rise enterprises still fail to understand the need to implement a future proof cloud security solution. At Cyberseer we ...

Google Chronicle: The forward-thinking solution for threat hunting

today13 June 2020

  • 182
close

Blog Elizabeth Gladen

Google Chronicle: The forward-thinking solution for threat hunting

Google Chronicle: The forward-thinking solution for threat hunting Chronicle is a new threat hunting platform, developed by Google. Leveraging Google, Cloud and Threat Feed technologies it provides analysts the ability to deep dive into accessible and enriched logs. It gives companies 12 months of hot storage with sub-second searchability. It ...

De stress your security staff with an advanced SOC?

today9 February 2020

  • 177
  • 1
close

Blog Elizabeth Gladen

De stress your security staff with an advanced SOC?

De stress your security staff with an advanced SOC? Published: 9th February 2020 Many factors affect the ability for and organisation to remain secure, including an exponential increase in log data due to the adoption of cloud operating models, endpoint monitoring and more reliance being placed on online applications. The ...

Blog Reasons for MSSP's to Detect Security Incidents

today7 May 2019

  • 825
Featuredstar
close

Blog Elizabeth Gladen

8 Reasons for Detecting & Investigating Security Incidents with a Managed Security Provider

8 Reasons for Detecting & Investigating Security Incidents with a Managed Security Provider The threat landscape is continually evolving affecting all types of business that embrace and rely on technology to continue their day to day operations. The explosion of cloud-based applications and services coupled with initiatives such as Bring ...

Detecting Emotet Malspam

today7 March 2019

  • 2650
Featuredstar
close

Blog Elizabeth Gladen

Detecting Emotet Malspam

Detecting Emotet Malspam Introduction to Emotet Malspam Recently, one of Cyberseer’s customer’s was hit with a “Malspam” campaign aiming to plant the Emotet malware within its network.  The original e-mail was sent to a distribution group which quickly escalated the situation. As this was a new campaign for that day, ...

Insider Data Theft

today28 February 2019

  • 163
  • 2
Featuredstar
close

Blog Elizabeth Gladen

Insider Data Theft

Insider Data Theft After a quick browse of cybersecurity headlines, any reader would quickly see the sheer volume of new and evolving threats an organisation may face. Often the biggest threats originate from outside an organisation. However, inside threats should be treated with just as much urgency.  Whether you are ...

WannaCry continues 21 months later

today13 February 2019

  • 201
Featuredstar
close

Blog Elizabeth Gladen

WannaCry continues 21 months later

WannaCry continues 21 months later 21 months after WannaCry’s initial discovery, a recent report from Kaspersky Labs has revealed that the WannaCry ransomware is still the most prevalent “crypter” with close to 75,000 users being infected as of Q3 2018, more than double that of its closest rival [1]. More ...

A day in the life a Cyber Security Analyst

today17 January 2019

  • 987
  • 1
Featuredstar
close

Blog Elizabeth Gladen

A day in the life a Cyber Security Analyst

A day in the life a Cyber Security Analyst Regardless of the specific role of a professional working in cyber security, the day that lies ahead is unlikely to follow a generic 9 to 5 pattern. The unpredictable nature of the ever-evolving threat landscape can mean everything is quiet until ...