Carl Parker

Privilege Access Management Maturity Showcase with Delinea

Introductory Webinar Privileged Access Management Maturity Showcase with Delinea Reduce risk associated with privileged accounts, enhance business agility, & boost efficiency.​ Available to Watch on Demand Virtual, GoToWebinar Please complete a GoToWebinar System Check to ensure device compatibility WATCH NOW SIGN UP TO MAILING LIST Meet the Experts Mark Lillywhite,Enterprise Sales Engineer at Delinea Ewan […]

Privilege Access Management Maturity Showcase with Delinea Read More »

What Is Data Security Posture Management (DSPM)

What is Data Security Posture Management (DSPM)?

Somerford Blog What is Data Security Posture Management (DSPM)? Author: Beth Laws Release Date: 28/06/2024 DSPM is a term being used frequently throughout the Security world. DSPM stands for Data Security Posture Management and focuses on improving businesses’ overall security stance when it comes to their data and compliance requirements. Protecting company data and proprietary

What is Data Security Posture Management (DSPM)? Read More »

What Is Attack Path Analysis

What is Attack Path Analysis?

Somerford Blog What is Attack Path Analysis? Author: Jake Hammacott Release Date: 17/06/2024 Attack path analysis is a generic term used for solutions that attempt to link and visualise risky assets that could be exploited in tandem to progress the state of a cyber-attack. The purpose of this is to enrich compliance, vulnerability and entitlement

What is Attack Path Analysis? Read More »

Splunk .conf24 Summary Showcase: Latest Updates and Key Features from Splunk’s User Conference

Splunk .conf24 Summary Showcase​ Join Somerford’s Senior Security Strategist for a summary of Splunk’s .conf24.​​ WATCH ON DEMAND SIGN UP TO MAILING LIST About the Webinar Join Ben Marrable, Somerford’s Senior Security Strategist (CISSP), for an exclusive webinar summarising the latest developments and key features from Splunk’s latest user conference. We’ll provide an overview of

Splunk .conf24 Summary Showcase: Latest Updates and Key Features from Splunk’s User Conference Read More »

Setting up SplunkWeb with Third Party Certificates End-to-End on a Built Environment (Part 1)

Setting up SplunkWeb with Third Party Certificates End-to-End on a Built Environment (Part 3)

Somerford Blog Setting up SplunkWeb with Third Party Certificates End-to-End on a Built Environment (Part 3) Author: Laurence Everitt Release Date: 29/05/2024 Introduction This is the last part of a 3 part explanation of how to uplift SplunkWeb from presenting a regular HTTP website to using full-blown SSL/TLS HTTPS website, end-to-end. For further information, please

Setting up SplunkWeb with Third Party Certificates End-to-End on a Built Environment (Part 3) Read More »

Setting up SplunkWeb with Third Party Certificates End-to-End on a Built Environment (Part 1)

Setting up SplunkWeb with Third Party Certificates End-to-End on a Built Environment (Part 2)

Somerford Blog Setting up SplunkWeb with Third Party Certificates End-to-End on a Built Environment (Part 2) Author: Laurence Everitt Release Date: 29/05/2024 Introduction This is the second part of a 3 part explanation of how to uplift SplunkWeb from presenting a regular HTTP website to using full-blown SSL/TLS HTTPS website, end-to-end. For further information, please

Setting up SplunkWeb with Third Party Certificates End-to-End on a Built Environment (Part 2) Read More »

Scroll to Top