
Check out our latest blogs


Product Update – Threat Management

Product Update - Phishing & Training

Discover more about SIEM
Learn how SIEM helps you to monitor and detect unauthorised access, stop data breaches, and strengthen your defences with 24/7 coverage. Plus, read our analyst tips on how to get the most value from your solution.
Further reading

Product Update – New integrations + user management for Microsoft 365

Latest product updates – November 2024

Product Update – Threat Management

Product Update - Phishing & Training

Ransomware Demands – A Record Breaking Fee

CrowdStrike & Microsoft IT Outage Guidance

SIEM vs. EDR: What’s the difference?

Product Update – Microsoft 365 Integration

Fighting fatigue: 5 ways to avoid cyber burnout

Getting board buy-in for cyber security by engaging each stakeholder

From risk to resilience: The secure by design advantage

How to reduce the impact of a data breach with SIEM

How to perform a cybersecurity risk assessment

ISO 27001: The international standard for information security

PCI DSS v4.0 – Five changes you need to know

The FTC Safeguards Rule: What You Need to Know

The price of protection: Why cyber insurance premiums are on the rise

Cyber resilience: could you withstand a cyber attack?

SIEM System: Building In-House or Outsourcing

Difference between MDR, SOC & SIEM

Security risks in cloud computing

Improve Your Cybersecurity with Password MFA

The Importance of Removing User Access

The Importance of Patch Management

5 Reasons Why You Should Outsource Your SOC

Log Monitoring: A Complete Guide

What is Phishing? Types & How to Prevent it

What is a vCISO? A Complete Guide

Threat Management – Latest Product Updates

7-Step Guide on Post-Breach Remediation

Top Tips on How to Defend Against Ransomware

Cybersecurity in Public Sector Budgeting

Ukraine Crisis: The Impact on cybersecurity

Log4j & Log4shell Vulnerability Explained

Cyber Essentials Changes & Updates 2022

Getting Started with Compliance

Our Saas Platform vs. Microsoft Defender

Get Your Team Excited About Security Training

Why We Built the Defense.com™ SaaS platform

A guide to cybersecurity for SMBs

4 Cybersecurity Quick Wins for SMB Owners

10 Things You Should Know About Cybersecurity

Involving Channel Partners in IT Security

What SMBs Can Learn From Big Breaches
