Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

The Cyber Security Breaches Survey 2022: key insights

The Cyber Security Breaches Survey helps to inform government policy on cyber security. As well as exploring processes and approaches to cyber security within a range of different organisations, the survey also looks at the varying types of cyber-attacks they face and their responses. In this blog post, we outline some of the main findings of the 2022 survey.

The KapeTriage MindMap: supporting more efficient IR investigations

KAPE uses targets and modules to collect and parse digital evidence. These include the KapeTriage Compound Target, through which examiners can gather important information pertaining to an investigation within seconds. In this blog, we outline the KapeTriage MindMap, which provides a hierarchical outline of the KapeTriage Compound Target and shows how various segments collectively deliver the most relevant results.

New Kroll threat landscape report highlights persistent cyber threats

Created by threat intelligence specialists from Kroll and Redscan, the new report, Q4 2021 Threat Landscape: Software Exploits Abound, explores key insights and trends from over 3,200 cyber incidents handled worldwide in 2021. In early December 2021, Redscan’s analysis of the National Vulnerability Database (NVD), the Common Vulnerability Database (CVD) repository of the U.S.

A day in the life of a SOC analyst

SOC Analysts manage and monitor a range of detection technologies to identify, investigate and respond to threats, 24/7/365. But what does the role of a SOC Analyst actually involve day-to-day, what are the rewards and challenges of the job, and how do people get into it as a career? To find out more, we spoke with SOC Shift Lead, Anthony Howell.

The 2022 Cyber Essentials update: what's involved?

Cyber Essentials is a government-backed and industry-recognised initiative which aims to raise cyber security awareness and help businesses mitigate common internet-based threats. The Cyber Essentials update is the biggest overhaul of the scheme’s technical controls since it was first launched in 2014.