Blog

Don’t be the next Travelex!

As a business starts its journey towards the cloud, security focus will often shift outwards towards the Internet.  By moving data from inside the traditional network perimeter to the cloud, a whole new set of cybersecurity considerations occur and questions such as “How can we prevent our cloud environment from a breach and protect our data from theft?” become more relevant than ever.

more →

Blog

Make your Endpoint Protection work smarter not harder with SOAR

When we hear the term ‘Endpoint Security’ we often think of making sure your organization is protected from malicious actors and cyberattacks attacking via an endpoint. This involves making sure that all the access points into an organization’s critical systems and physical devices are protected from unauthorized access to prevent damage to the rest of the network.

more →

Blog

Not What It SIEMs. How SMEs Can Unlock the Power of Logs Without a SOC

Almost every single computing device, laptop, desktop, router, firewall, keeps a record of things that have changed over time. Borrowing from maritime parlance, we call these “logs”. Logs are ledgers of changes in state, recorded and stored in sequence, and can tell you a lot about what that computing device has been doing, why it has been doing it, and when.

more →