Secrutiny Cyber Security Blog
Get the latest in security advisories, threat commentary and remediation recommendations from information security experts.
Subscribe to our newsletter
Last month we had the opportunity to be a part of Securing the Law Firm 2019 with an Education Seminar centred around best-practice for constructing SOC-as-a-Service (SOCaaS), so you know you can get value; here’s the low-down.
Gartner Reveals Breach and Attack Simulation Technologies as One of the Top Cyber Security Solutions
Breach and attack simulation technologies have been highlighted as one of the top solutions for CISOs to consider in Gartner’s recent report, ‘How to Respond to the 2019 Threat Landscape’.
A recent survey of security professionals carried out by Secrutiny revealed that more than 80% of respondents are concerned about data loss post threat.
The question we all need to be asking ourselves. We take a look at why it’s more vital than ever organisations prevent encryption from becoming a security risk and how you can uncover hidden threats in encrypted traffic.
A fileless malware campaign is being abused by malicious actors to drop the information stealing Astaroth Trojan into the memory of infected computers.
Intentional or not, insider threats are on the rise. Don’t take the chance; gain a better understanding in our cyber security infographic.