Blog

Monitoring Cloud Compliance

How to Monitor Cloud Compliance with Lacework FortiCNAPP

Somerford Blog How to Monitor Cloud Compliance with Lacework FortiCNAPP Author: Jake Hammacott Release Date: 15/08/2024 Compliance and governance of IT infrastructure is incredibly important in any enterprise. Failing to meet standards set by governments, industry-recognised compliance frameworks and internal policies can lead to an increased risk of resources being leveraged and exploited by malicious […]

How to Monitor Cloud Compliance with Lacework FortiCNAPP Read More »

Lacework logo

Introduction to Lacework — Data-Driven Security Platform for the Cloud

Somerford Blog Lacework FortiCNAPP: A Data-Driven Security Platform for the Cloud Author: Jack Hancox Release Date: 27/03/2024 In the dynamic landscape of cloud computing, ensuring the security of your digital assets is paramount. As organisations migrate to cloud environments, a robust security solution becomes crucial. Enter Lacework FortiCNAPP, a cutting-edge data-driven security platform tailored for

Introduction to Lacework — Data-Driven Security Platform for the Cloud Read More »

What Is Attack Path Analysis

What is Attack Path Analysis?

Somerford Blog What is Attack Path Analysis? Author: Jake Hammacott Release Date: 17/06/2024 Attack path analysis is a generic term used for solutions that attempt to link and visualise risky assets that could be exploited in tandem to progress the state of a cyber-attack. The purpose of this is to enrich compliance, vulnerability and entitlement

What is Attack Path Analysis? Read More »

Man looking at laptop whilst working

KnowBe4 Security Awareness Training: A Complete Life Cycle Overview

Somerford Blog KnowBe4 Security Awareness Training: A Complete Life Cycle Overview Author: Jack Travis Release Date: 14/06/2023 Cybersecurity is a rapidly growing issue in today’s world. As cyber-attacks and data breaches become increasingly frequent each day, it is necessary for individuals and organisations to protect themselves from these threats. Although many organisations invest in security

KnowBe4 Security Awareness Training: A Complete Life Cycle Overview Read More »

Phishing Managed Service – Maximise your Defence with KnowBe4

Somerford Blog Phishing Managed Service – Maximise your Defence with KnowBe4 Author: Becca Lambert Release Date: 10/10/2023 What is KnowBe4 as a Managed Service? With KnowBe4 as a Managed Service from Somerford, we will help you to deploy your KnowBe4 Platform effectively, without taking up valuable IT or admin resources. Helping you eliminate the human

Phishing Managed Service – Maximise your Defence with KnowBe4 Read More »

How Advanced Persistent Threats (APTs) Work

Somerford Blog How Advanced Persistent Threats (APTs) Work Author: Carl Parker Release Date: 19/01/2024 What are Advanced Persistent Threats? When belligerent parties target a business’ data and infrastructure in threatening attacks, the most commonly considered strategy is a fast, quickly spreading virus that searches for valuable information, then retreats as quickly as it entered. Advanced

How Advanced Persistent Threats (APTs) Work Read More »

Introducing Athena AI for Varonis SaaS

Introducing Athena AI for Varonis SaaS

Somerford Blog Introducing Athena AI for Varonis SaaS Author: Beth Laws Release Date: 11/12/2023 Athena AI is the new generative AI layer added into Varonis SaaS. Athena AI, named appropriately after the mythological Greek goddess of wisdom, can assist administrators throughout the data security platform, producing more efficient analysis and reducing crucial investigation times. Natural

Introducing Athena AI for Varonis SaaS Read More »

How HashiCorp's Solutions Suite Secures Kubernetes for Business Success

How HashiCorp’s Solutions Suite Secures Kubernetes for Business Success

Somerford Blog How HashiCorp’s Solutions Suite Secures Kubernetes for Business Success Author: John Jarvis Release Date: 22/01/2024 Kubernetes has become a cornerstone of modern architecture. But managing it at scale, and securely, can be a big challenge. That’s where HashiCorp’s suite of tools comes in. From secrets management with Vault to service mesh security with

How HashiCorp’s Solutions Suite Secures Kubernetes for Business Success Read More »

Why Organisations Need Privileged Access Management Systems

Why Organisations Need Privileged Access Management Systems

Somerford Blog Why Organisations Need Privileged Access Management (PAM) Systems Author: Ewan Brown Release Date: 03/02/2025 In the modern digital landscape, securing an organisation’s sensitive data and infrastructure is critical. Cyber threats are constantly evolving, and one of the primary targets for attackers is privileged accounts. These accounts hold elevated permissions, allowing users to access

Why Organisations Need Privileged Access Management Systems Read More »

Scroll to Top