Blog

What's New for Splunk Enterprise Security v8

What’s New for Splunk Enterprise Security v8?

Somerford Blog What’s New for Splunk Enterprise Security v8? Author: Ben Marrable Release Date: 11/12/2024 Splunk introduced many changes when releasing Enterprise Security 8.0, see the links at the bottom for more. One of the most significant is the language used within the technology. The idea was to standardise the terminology across the CyberSecurity Industry […]

What’s New for Splunk Enterprise Security v8? Read More »

How Does Varonis MDDR Help to Mitigate Complex Threats

How Does Varonis MDDR Help to Mitigate Complex Threats?

Somerford Blog How Does Varonis MDDR Help to Mitigate Complex Threats Author: Beth Laws Release Date: 23/12/2024 The new Varonis Managed Data Detection and Response (MDDR) offering provides 24/7, 365 days a year service. MDDR combines the data security platform’s award winning threat detection technology alongside the Varonis team of cyber experts to investigate and

How Does Varonis MDDR Help to Mitigate Complex Threats? Read More »

Monitoring Cloud Compliance

How to Monitor Cloud Compliance with Lacework FortiCNAPP

Somerford Blog How to Monitor Cloud Compliance with Lacework FortiCNAPP Author: Jake Hammacott Release Date: 15/08/2024 Compliance and governance of IT infrastructure is incredibly important in any enterprise. Failing to meet standards set by governments, industry-recognised compliance frameworks and internal policies can lead to an increased risk of resources being leveraged and exploited by malicious

How to Monitor Cloud Compliance with Lacework FortiCNAPP Read More »

Lacework logo

Introduction to Lacework — Data-Driven Security Platform for the Cloud

Somerford Blog Lacework FortiCNAPP: A Data-Driven Security Platform for the Cloud Author: Jack Hancox Release Date: 27/03/2024 In the dynamic landscape of cloud computing, ensuring the security of your digital assets is paramount. As organisations migrate to cloud environments, a robust security solution becomes crucial. Enter Lacework FortiCNAPP, a cutting-edge data-driven security platform tailored for

Introduction to Lacework — Data-Driven Security Platform for the Cloud Read More »

What Is Attack Path Analysis

What is Attack Path Analysis?

Somerford Blog What is Attack Path Analysis? Author: Jake Hammacott Release Date: 17/06/2024 Attack path analysis is a generic term used for solutions that attempt to link and visualise risky assets that could be exploited in tandem to progress the state of a cyber-attack. The purpose of this is to enrich compliance, vulnerability and entitlement

What is Attack Path Analysis? Read More »

Man looking at laptop whilst working

KnowBe4 Security Awareness Training: A Complete Life Cycle Overview

Somerford Blog KnowBe4 Security Awareness Training: A Complete Life Cycle Overview Author: Jack Travis Release Date: 14/06/2023 Cybersecurity is a rapidly growing issue in today’s world. As cyber-attacks and data breaches become increasingly frequent each day, it is necessary for individuals and organisations to protect themselves from these threats. Although many organisations invest in security

KnowBe4 Security Awareness Training: A Complete Life Cycle Overview Read More »

Phishing Managed Service – Maximise your Defence with KnowBe4

Somerford Blog Phishing Managed Service – Maximise your Defence with KnowBe4 Author: Becca Lambert Release Date: 10/10/2023 What is KnowBe4 as a Managed Service? With KnowBe4 as a Managed Service from Somerford, we will help you to deploy your KnowBe4 Platform effectively, without taking up valuable IT or admin resources. Helping you eliminate the human

Phishing Managed Service – Maximise your Defence with KnowBe4 Read More »

How Advanced Persistent Threats (APTs) Work

Somerford Blog How Advanced Persistent Threats (APTs) Work Author: Carl Parker Release Date: 19/01/2024 What are Advanced Persistent Threats? When belligerent parties target a business’ data and infrastructure in threatening attacks, the most commonly considered strategy is a fast, quickly spreading virus that searches for valuable information, then retreats as quickly as it entered. Advanced

How Advanced Persistent Threats (APTs) Work Read More »

Scroll to Top