Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Why SOCs Need AI Threat Detection

Getting the benefits of AI threat detection tools is becoming less of an option for security operation centres (SOCs). Last year, the UK experienced more cyber attacks than any other country in Europe. According to IBM’s X-Force Threat Intelligence Index report, nearly half (43%) of all cyber attacks in Europe targeted UK-based organisations.

Beyond "best of breed." Solving for risk through consolidation

It’s 2023, and security cap-ex spending is at an all-time high and forecast to keep growing. Thanks to frameworks like MITRE ATT&CK, we also know more about how threat actors function than ever. There is no shortage of security solutions either – the average organisation uses around 60 within its environment. But cyber attacks still do hundreds of billions of dollars of damage annually. So, what’s going wrong? The answer has three parts. Firstly, cybercrime has gotten a lot easier.

Managed NDR, NDR or Advanced NDR

Managed NDR is network detection and response (NDR) combined with an outsourced SOC (Security Operations Center) monitoring and response layer. The meaning of “managed” in managed NDR will vary from provider to provider. Some managed NDR services will remediate threats for you, while others will stop at alerting and assisting your internal IT team. Similarly, the capabilities of the “NDR” part of managed NDR will also differ depending on who offers it.

Why Your SOC Needs Automated Incident Response

Automated incident response can help security teams identify and respond to cyber threats faster. When a breach happens, delays equal costs. Today, a cyber attack happens every 39 seconds, and the global average total cost of a data breach is the highest it’s been in 17 years. In this environment, a low response time is crucial to reducing cyber risk.