Essentials of cyber security for risk management
Cyber security teams need sophisticated technology and intelligence to help them stay ahead of cyber attacks. Business leaders expect greater visibility of cyber risk and how to mitigate it so they can make business decisions swiftly and with confidence.
Threat Essentials is a new threat intelligence platform designed to turn cyber security into a strategic risk management tool and business asset.
Why organisations need threat intelligence services?
Manage cyber risk – and cyber spend more strategically
Empower and equip security teams to be proactive, not reactive
Accelerate decision-making and gain competitive advantage
Read and share the latest blogs from our cyber analysts
Taliban Takeover: evaluating the impact on the cyber threat landscape
With the Taliban returning to power in Afghanistan the global security community is hastily re-evaluating the physical security situation for both the region and the globe in light of these strategically surprisingly event.
What the rising cyber threat landscape means for businesses
In what has no doubt been a difficult 18 months for the planet, the number of cyber attacks has increased tenfold since the pandemic began. In fact, 2020 was considered the busiest year on record for cyber criminal activity with a 20% surge in incidents according to IT Pro. Elsewhere, Lindy Cameron, Chief Executive of the National Cyber Security Centre shared that ransomware hackers were now considered the biggest risk to UK National security over online espionage by hostile states, showing how...
A day-in-the-life of a Cyber Threat Intelligence Analyst
Cyber Threat Intelligence (CTI) is the new kid on the block when it comes down to roles both within cyber security and within the wider practice of threat intelligence research. CTI is different from conventional “bomb and bullet” research both in terms of the skills that you use and the career path that you follow. This blog is intended to give a brief snapshot of the day-to-day of a typical CTI role and some of its key features.