Cloud Security and Governance – Mind the Security Gap
Cloud Security and Governance – Mind the Security Gap Workloads are migrating to the Cloud with…
Cloud Security and Governance – Mind the Security Gap Workloads are migrating to the Cloud with…
Penetration Testing Penetration testing is essentially recreating malicious attacks in order to exploit and identify gaps…
Vulnerability Management – Assessment and Patching An effective Vulnerability Assessment (VA) approach Organisations are most likely…
Managed Detection and Response (MDR) What is a Managed Detection and Response service? Managed Detection and…
Endpoint Detection and Response Solutions – EDR / XDR / MDR Endpoint Protection Platforms (EPP) are…
SOAR – Security Operations, Analytics and Reporting Orchestration and Automation of incident response are key elements…
Threat Intelligence What is Threat Intelligence? Threat intelligence is information about the activity taking place inside…
CASB – Cloud Access Security Broker Cloud Access Security Brokers (CASB) provide visibility and control of…
Least Privilege Access Control A “Least Privileged” access control regime provides users with only the minimum…
Incident Response Process Incident Response Planning Not to be too negative, but a serious security incident…
Application Whitelisting What is Application Whitelisting? Application whitelisting is the practice of defining approved software within…
Web and Content Filtering Content Filtering involves the use of certain hardware and software components, that…
Network Intrusion Prevention System (IPS) IPS is a solution which is designed to prevent malicious activity…
Identity Access Management – Securing every Industry One of the most effective ways for a business…
Privileged Account Management (PAM) What does Privileged Access mean? Privileged access can be defined as administrative…
Monitor Security Services Keep your eyes on the pulse. You can collect and monitor information, identify…
Email Gateway Security ESGs – Even in a Cloud first world an Email Security Gateway is…
Vulnerability Management So what is Vulnerability Management? We’d suggest it is an ongoing process to ensure…
Edge Protection A business’s network edge or perimeter was once upon a time easily defined. Everything…
Endpoint Protection Platforms Anti-Malware and Anti-Virus – Critical to any security program Protection from malware, including…
Backup Strategy and Solutions Backing up your business data is a critical foundation of any business…