Knowledge - Saepio
Play
Anthony S

Log4j Vulnerability – Education and Guidance from our vCISO team

It’s been a busy weekend for attackers and defenders alike – security researchers have already detected a wealth of malicious activities where the bad guys have been exploiting arguably the biggest vulnerability of 2021. This has been commonly referred to at the Log4j vulnerability. It feels like we have stepped back in time to 2014 when the internet last broke thanks to the poodle and heartbleed vulnerabilities!
Play
Joe Hedegaard Ganly

Evaluating Workforce Identity Maturity

We’ve seen in the last year and a half some amazing transformation of IT systems to enable teams to work remotely efficiently and securely because of the pandemic. Ensuring that everyone, regardless of where they are and what their role entails can have a seamless experience is far from simple. Remote onboarding is an area we’ve seen customers have significant challenges – having to set up different accounts and test access systems, ensuring that the right privileges and access permission are right all remotely certainly took its toll on IT teams!
Play
Nick Moss

Backup – a Critical Pillar of Incident Response

We live and breathe security at Saepio, so it’s quite fascinating for us that most new organisations we speak to have not conducted a Cyber Risk Assessment.  The 2021 UK Gov cyber survey states only 34% of businesses have.  For those that haven’t, it’s difficult for them to know how ready they are to respond to a cyber attack.

When Saepio are interviewing senior executives during the risk assessments we conduct, the most common concern is the threat of Ransomware and the organisation’s ability to quickly recover.  The National Cyber Security Centre’s (NCSC) Cyber

Play
Nick Moss

Third Party Cyber Risk Management

I’m glad to see that UK companies of all sizes, and across all verticals, are starting to take Cyber Security more seriously. More organisations are looking at best practice guidance, and frameworks such as Cyber Essentials, ISO27001 or the NCSC CAF.

Areas common to those three standards, are to look into the technical vulnerabilities they might face, and how good vulnerability management and patching is a cornerstone of foundational security. Understanding the importance of human vulnerabilities is also on the rise, how to educate your staff, and

Play
Play
Rob Pooley

Security Technology Integrations

It’s universally agreed that security is a team sport – there’s no ‘I’ in Cyber Defence! Currently, a lot of industry articles talk about ‘security technology integrations’ but what do they mean, what’s the benefit, how do they work in the real world, how do they increase security and reduce operational overhead? This is something Saepio are well versed in.