Blog

2019

StarLink Security Review

Security is frequently in the news for all the wrong reasons. Stories about data loss, security breaches and malicious malware attacks often dominate the headlines but fail to see the wider picture. Is it time to change the way we think about IT Security and approach the problem from another...

2018

Adding value to a SIEM solution

Security Information and Event Management (SIEM) tools are the main component of a Security Operations Center (SOC) and are critical to manage the plethora of alerts that security teams face. The purpose of a SIEM is to collect and collate events and alerts from a range of sources, including log...

Detect/Prevent/Respond

Many people believe that a prevention solution is the be all, and end all, of protecting against next-generation threats. Unfortunately, this is not the case as prevention solutions can never be 100% accurate given the fact that threats are evolving faster than the technology to protect against...

Power up your SIEM

Even with multiple security tools and staff, many organisations have become victims of cyber-attacks. Thus, it is not possible to solely rely on conventional security approaches anymore. Effective threat intelligence is key to combating advanced threats, enabling security teams to empower their...

Are you ready to SOAR?

In today’s world with the severe cybersecurity skills shortage, security teams are drowning in complexity, compliance keeps changing, and cyberattacks just won’t quit. It is important to transform your security operations with automated detection and response.

But before doing so, today’s...

Your people need vision!

Every day, hundreds of organisations, large and small, fall victim to a cyber-attack, be it via phishing, ransomware or the other multitude of modern malware. The reputational, operational and financial costs to businesses is huge.

Most organisations would agree that they are nothing without...

Can secure access be simple?

Attacks involving compromised users and entities are notoriously difficult to detect because cyber criminals can evade perimeter defenses by using legitimate credentials to access corporate resources.

On average, 56% of resources are protected by 2FA yet 81% of breaches still involve weak or...

Get ahead of the attackers

Traditional security measures help minimise breaches. However, with attacks getting more frequent, sophisticated and advanced, there is a need for security teams to get ahead of the attackers. Artificial intelligence can help.

Behavioral analytics, machine learning, NLP are all nascent forms,...

Pivot from Packet to SIEM

Security Information and Event Management (SIEM) tools are the main component of a Security Operations Center (SOC). Used to collect and collate events and alerts from a range of sources, it gives security analysts a more holistic view of activity, saving them time in collating information...