Collection: Latest insights and cybersecurity resources

Importance of IOC Detection Rules

Importance of IOC Detection Rules


Marius Maciuitis
Continue
(Another) Business Email Compromise (BEC) Story

(Another) Business Email Compromise (BEC) Story


Marius Maciuitis
Continue
A foundational Threat Hunting framework

A foundational Threat Hunting framework


Marius Maciuitis
Continue
The difference between a SOC and a SIEM and do you need both?

The difference between a SOC and a SIEM and do...


Marius Maciuitis
Organisations looking to improve their cybersecurity posture are faced with many buying decisions, terminology and technology. The terms SIEM and SOC are sometimes incorrectly used interchangeably so what is the difference between them and do you need both?
Continue
Simplified UK government procurement of cybersecurity services

Simplified UK government procurement of cybersecurity services


Andrew Papastefanou
Continue
WesBank leads with its world class Identity and Access Management implementation

WesBank leads with its world class Identity and Access Management...


Andrew Papastefanou
Continue