Play
Rob Pooley

Saepio Secures Growth Investment

Saepio has secured growth investment and appointed two co-CEOs to turbocharge our mission of becoming the go to Cyber Security Partner across the UK & Europe. Saepio has been acquired by a dynamic duo of tech pros who have taken the helm as co-CEOs to spearhead growth in Europe. The cybersecurity specialist tells CRN it has found the “right” investors after a “lengthy process” to grow and build its brand, with Amir Nooriala and Daniel Cardenas-Clark, tag teaming as co-CEOs.
Play
Rob Pooley

Automating Cybersecurity – Embracing responsible automation to stay ahead of attackers

Robert Pooley, Saepio Solutions Director, talks us through how to embrace automation and stay ahead of the attackers.
Play
Joe Hedegaard Ganly

Powering up your Detection of Email & Endpoint Response

Emails and Endpoint devices remain two of the main attack vectors contributing to cyber incidents, often as initial access points. While continuously evolving their tactics, once attackers get initial access, they then leverage blind spots in controls to buy precious time to broaden their access in environments. Security teams often struggle to centralise alerts to detect and respond to suspected compromises, with lots of manual work needed to remove attacker’s access.

Joseph Hedegaard-Ganly, a Saepio Solutions Architect, answers some key questions around remediating this

Play
Joe Hedegaard Ganly

The State of Email Security

Email continues to be a primary communication channel for businesses, making it a prime target for cybercriminals. Any solution used at the email layer needs to be leveraging sophisticated threat intelligence and machine learning algorithms that can detect and block various email-based attacks, such as phishing, malware, ransomware, and social engineering attempts.
Play
Rob Pooley

The Mindset Shift in Vulnerability Management

Automated Vulnerability Discovery & Remediation.  To compromise organisations, attackers are developing and deploying exploits faster than ever before which is resulting in a vulnerability management mindset shift; ‘the impact and likelihood of adverse reactions to patches are lower than the impact and likelihood of a bad actor attempting to exploit the vulnerability.’