Play
Joe Hedegaard Ganly

Powering up your Detection of Email & Endpoint Response

Emails and Endpoint devices remain two of the main attack vectors contributing to cyber incidents, often as initial access points. While continuously evolving their tactics, once attackers get initial access, they then leverage blind spots in controls to buy precious time to broaden their access in environments. Security teams often struggle to centralise alerts to detect and respond to suspected compromises, with lots of manual work needed to remove attacker’s access.

Joseph Hedegaard-Ganly, a Saepio Solutions Architect, answers some key questions around remediating this

Play
Joe Hedegaard Ganly

The State of Email Security

Email continues to be a primary communication channel for businesses, making it a prime target for cybercriminals. Any solution used at the email layer needs to be leveraging sophisticated threat intelligence and machine learning algorithms that can detect and block various email-based attacks, such as phishing, malware, ransomware, and social engineering attempts.
Play
Rob Pooley

The Mindset Shift in Vulnerability Management

Automated Vulnerability Discovery & Remediation.  To compromise organisations, attackers are developing and deploying exploits faster than ever before which is resulting in a vulnerability management mindset shift; ‘the impact and likelihood of adverse reactions to patches are lower than the impact and likelihood of a bad actor attempting to exploit the vulnerability.’
Play
Claire Harratt

The State of Cloud Data Security

The cloud unlocks tremendous value for organisations, but along with convenience and collaboration, it is also much harder to spot risks. SaaS applications, in particular, are often the biggest blind spots for organisations looking to defend their data, as cloud applications create a broad, interconnected attack surface that can be compromised in new ways by insiders and external actors.
Play
Joe Hedegaard Ganly

Dealing with Incidents

Incidents. In the context of cyber and information security, they’re rarely a positive thing. Data breaches, intrusions, defacements, denial of services, outages…… enough to make you shudder. Critical incidents, like compromised systems or ransom/wiper malware attacks can be particularly anxiety inducing. Trying to establish facts and understand just how much is impacted – the unknowns are normally the hardest part to deal with. So… how bad are things actually?