How is the cyber threat landscape changing regulatory requirements?
Key developments in the cyber threat landscape are increasingly shaping regulatory requirements. Tune in to this on-demand webinar as Secrutiny and Orpheus discuss how Covid-19 has forced organisations into non-compliance with some policies and regulations, and the key lessons [ ... More Here > ]
Zero Trust – It’s a privilege to have no privilege
Prevalent standing privilege (those accounts with always-on/always-available admin access) are increasing your attack surface. It’s these accounts that provide the privilege to gain access to sensitive data or resources. Watch now to understand why this is your biggest undiscovered [ ... More Here > ]
The 2022 Spin on Ransomware – Where is it heading?
Request a demo If you would like to see how Secrutiny and SentinelOne can help protect your business from ransomware and other threats, contact us today. 2021 was the most active year for ransomware on record — and it's [ ... More Here > ]
Beyond Log4j: Preparing for supply chain risk
In the wake of the zero-day Log4j vulnerability, organisations should consider moving from a reactive fire-drill to having a proactive posture to addressing supply chain risk. Discover how to proactively address supply chain risks in this on-demand webinar with [ ... More Here > ]
Cyberwar threats organisations must prepare for due to current conflict in Ukraine
In this newscast, Cymulate's Cyber Evangelist Dave Klein discusses cyber threats that the current Ukraine conflict poses, globally. Topics: History of cyberattacks against Ukraine Current DDoS and Wiper cyber weapons in use in today’s conflict. What global sanctions in [ ... More Here > ]
The philosophy of cyber – combatting 3 common mistakes
Cybersecurity is not a philosophical exercise, but a little philosophical reflection can benefit your cybersecurity planning, incident response, and policy development. Security itself exists purely as a hypothetical. These days, there is no such thing as a genuinely secure [ ... More Here > ]
Consistency of controls – ‘anytime, anyplace, anywhere’ security
The dissolving perimeter is forcing IT leaders to accelerate their network and security transformation. To better manage risk, security programs need to be refocused for today’s cloud and mobile world, and efficiency and performance are more important than ever. [ ... More Here > ]
Better Log Management with Secrutiny Co-Founder Ian Morris
IBM industry analysis shows the average ‘time to identify and contain’ most breaches is 256 days. This raises a few questions on typical cybersecurity log management like; why do we typically only retain 90 days of security log data [ ... More Here > ]
Future of SOC Panel: When fine dining really does become all-inclusive
Very occasionally, in this world we see a market completely disrupted. Something deemed financially out of reach to the majority becomes very affordable. This panel discussion is about why everyone can afford enterprise-grade SOC/SIEM. Key thought leaders from Google, [ ... More Here > ]
10 Ways to Test Your Security Function Without Breaking the Bank
Security pros have a lot to juggle, including testing the defences you have put in place to see how robust they really are. Of course, Penetration Tests, Breach and Attack Simulation and Red/Blue/Purple Teaming are the obvious solutions, but [ ... More Here > ]
The ABCs of cyber risk prioritisation: fixing what really matters
How can organisations keep their focus on what's important and what can they do to stay aware of the course corrections they might need to take? The answer is cyber risk prioritisation – this means putting risk reduction back [ ... More Here > ]