Security videos

Learn how to improve your cybersecurity with industry updates and webinars on-demand from our team of in-house experts.

Security insights from the CEO

Cybersecurity CEO Oliver Pinson-Roxburgh shares his thoughts on current cybersecurity threats and provides valuable advice on how to best protect your business.

Is SIEM Dead? – Part 3: Maximising your security budget

Is SIEM Dead? – Part 3: Maximising your security budget

Join our Head of Customer Operations Dan and CEO Oliver as they reveal how you can win executive buy-in for your cyber security budget. Unlock the strategies to align your security plans with business goals and present risks like a pro.
Is SIEM Dead? – Part 2: Cloud convenience vs security

Is SIEM Dead? – Part 2: Cloud convenience vs security

Is your business relying too heavily on cloud security? Join our Head of Customer Operations Dan and our CEO Oliver, as they reveal the hidden costs of cloud complacency. Learn why “convenient” isn’t always cost-effective and how too much flexibility can lead to security slip-ups.
Is SIEM Dead? – Part 1: The limitations of XDR

Is SIEM Dead? – Part 1: The limitations of XDR

Considering XDR over your SIEM? It might not be the lifesaver you think! Our Head of Customer Operations Dan and CEO Oliver reveal why XDR isn’t the magic fix you’ve been sold. Learn why keeping your current tools might be smarter than you think.
There will be 20-40% increase in work effort – PCI DSS discussion with Andrew Henwood – Part 4

There will be 20-40% increase in work effort – PCI DSS discussion with Andrew Henwood – Part 4

Find out how to navigate PCI DSS v4.0 over the next 12 months. In this final episode, payment security evangelist Andrew Henwood and our CEO Oliver Pinson-Roxburgh break down the key challenges you can expect with v4.0.
Flexibility doesn’t mean things will be easier -PCI DSS discussion with Andrew Henwood – Part 3

Flexibility doesn’t mean things will be easier -PCI DSS discussion with Andrew Henwood – Part 3

The different approaches to compliance are one of the biggest structural changes from v3.2.1 to v4.0. In this part-three episode find out which approach would be best for you.
Have a good relationship with your assessor – PCI DSS discussion with Andrew Henwood – Part 2

Have a good relationship with your assessor – PCI DSS discussion with Andrew Henwood – Part 2

Any entity undergoing PCI DSS compliance needs to have a good relationship with their assessor. In this part-two episode find out why your assessor should be seen as a trusted guide, not an auditor.
Start your research now – PCI DSS discussion with Andrew Henwood – Part 1

Start your research now – PCI DSS discussion with Andrew Henwood – Part 1

Payment security evangelist Andrew Henwood warns against treating PCI DSS v4.0 as a simple ‘tick-box’ exercise. In this part-one episode find out why early research is necessary.
CEO Interviews – Part 3: AI & risk

CEO Interviews – Part 3: AI & risk

Is AI outpacing your security policies? Cyber experts Darren Kirby and Oliver Pinson-Roxburgh discuss why you need to get your employees in the know about intelligence tools. If you haven't made your stance clear yet, you might want to hear this!
CEO Interviews – Part 2: CISOs & shared responsibilities

CEO Interviews – Part 2: CISOs & shared responsibilities

Should your CISO take full accountability for a cyber attack? Cyber expert Darren Kirby and our CEO reveal the frank conversation a CISO needs to have with the board. If you’re responsible for cyber security in your business, you’re going to want to watch this.
CEO Interviews – Part 1: The Board

CEO Interviews – Part 1: The Board

Does your board dismiss cyber security? Sell security as a MONEY SAVER. Cyber expert Darren Kirby and our CEO give you the winning pitch. Learn their secrets.
Cyber burnout: Is your business at risk?

Cyber burnout: Is your business at risk?

Avoiding cyber burnout can help protect your organisation. Our CEO explains what a business can do to help ease the load on those responsible for cyber security.
The boardroom cybersecurity crisis: How to prepare!

The boardroom cybersecurity crisis: How to prepare!

If your board is not talking about cybersecurity and building it into the culture of your organisation, no one else in the business is going to take it seriously either. Find out why the board needs to make cybersecurity a key part of the overall business strategy.
How employee personal accounts threaten company security!

How employee personal accounts threaten company security!

Using personal accounts like Gmail or Google Drive for work purposes may seem convenient, but it opens your organisation up to major risks. Find out more about the potential dangers from our CEO.
Pretexting: Social engineering – What you need to know!

Pretexting: Social engineering – What you need to know!

You’ve heard of phishing scams but have you heard about pretexting. Find out more from our CEO.
Citrix servers hacked! Are the patched systems still compromised?

Citrix servers hacked! Are the patched systems still compromised?

Learn more about the Citrix NetScaler breach and why your company should be concerned.
This fake YouTube app could hijack your phone

This fake YouTube app could hijack your phone

There has recently been an increase in the threat of deceptive apps infecting devices with malware. Discover the mitigation strategies you need to know to protect your devices.
Secure Azure storage: How Microsoft learnt the hard way!

Secure Azure storage: How Microsoft learnt the hard way!

Even the best in the business lose data due to misconfiguration, Microsoft leaked 38TBs of data. Find out more from our CEO.
Unleashing AI: Balancing innovation and risk in cyber security

Unleashing AI: Balancing innovation and risk in cyber security

AI is a hot topic right now, with a lot of fearmongering. Hear from our CEO about the potential risks and security implications.
The U.S. Cyber Trust Mark: Does ‘secure’ labelling affect your willingness to pay more?

The U.S. Cyber Trust Mark: Does ‘secure’ labelling affect your willingness to pay more?

Would you pay more for a device if it was labelled as secure? Our CEO discusses the implications of this new labelling programme.
Business risk – What you need to know!

Business risk – What you need to know!

Regular risk assessments will help you to identify threats to your organisation and enable you to prioritise the critical risks first. Discover how you can demonstrate good risk management with our top tips.
Zero-day explosion: Why are they dominating the news?

Zero-day explosion: Why are they dominating the news?

Are you curious about the recent surge in zero-day vulnerabilities making headlines? Watch as our CEO explains why.
Speak their language: Tips for talking cybersecurity with leadership & CFO!

Speak their language: Tips for talking cybersecurity with leadership & CFO!

Cybersecurity spending can be a difficult sell to business leaders, and budget holders are being asked to cut costs where possible. It can be hard to measure and provide ROI for security, in this video our CEO shares what your leadership team will be thinking.
Top tips for better cybersecurity in the era of cloud computing

Top tips for better cybersecurity in the era of cloud computing

As technology advances and more businesses rely on cloud services it’s vital you implement robust cybersecurity measures to protect sensitive data. Discover 7 cyber security best practices from our CEO.
Microsoft zero-day patch being exploited: Things you need to know!

Microsoft zero-day patch being exploited: Things you need to know!

Find out the latest on the Microsoft vulnerability involving the use of malicious Word documents.
Protecting your business from data breaches: Lessons from a recent patient data leak

Protecting your business from data breaches: Lessons from a recent patient data leak

A recent ransomware attack on the University of Manchester has compromised NHS patient data. Discover 4 key steps to safeguard your business against data breaches.
Demystifying Business Email Compromise (BEC): Don’t fall for the trap!

Demystifying Business Email Compromise (BEC): Don’t fall for the trap!

Discover the necessary insights to recognise the red flags and warning signs of BEC attacks.
Ransomware on the rampage: Is the rise of AI to blame?

Ransomware on the rampage: Is the rise of AI to blame?

Learn from our CEO about the basics of ransomware, how it infiltrates systems and the role of AI in creating more sophisticated attacks.
Google’s risky move!.zip &.mov domains could empower hackers

Google’s risky move!.zip &.mov domains could empower hackers

Our CEO delves into the controversial decision by Google to introduce .zip and . mov domains and the potential consequences they pose.
Cyber crime crackdown: the Genesis Marketplace takedown REVEALED!

Cyber crime crackdown: the Genesis Marketplace takedown REVEALED!

Learn more about the inner working of the Genesis criminal marketplace. Get valuable advice on what to do and how to prevent this type of attack.
The ChatGPT data leak: What went wrong and were you exposed?

The ChatGPT data leak: What went wrong and were you exposed?

Find out what happened with the ChatGPT data leak and all you need to know about it’s data policy.
Hackers have a new target: Mac users – are you at risk?

Hackers have a new target: Mac users – are you at risk?

As the popularity of Apple products continues to rise, so does the interest of cybercriminals. Find out from our CEO why you might not be as secure as you think you are with a Mac.
LinkedIn scammers are targeting jobseekers

LinkedIn scammers are targeting jobseekers

The LinkedIn scammers are at it again! We take a closer look at the problem and tell you how you can stay safe when job hunting online.
How safe is your data? Don’t get caught out using ChatGPT and TikTok

How safe is your data? Don’t get caught out using ChatGPT and TikTok

With cyberattacks becoming increasingly common, it is more important than ever for your company to take cybersecurity seriously. Find out why your business and employees need to be aware about sharing sensitive data online.
What is a digital fingerprint? Why is it important for a business?

What is a digital fingerprint? Why is it important for a business?

Discover what digital fingerprints are, how they work and why they’re important for your business to pay attention to.

Cybersecurity webinars

Improve your understanding of cybersecurity topics with our on-demand videos.

Managed SIEM: How to protect your business with detection & response

Managed SIEM: How to protect your business with detection & response

Our CEO shares his thoughts on the importance of having a Managed SIEM service. He delves into scenarios from our SOC team, how proactive threat detection work and what to expect from a SIEM solution.
Cyber Resilience: how to strengthen your security

Cyber Resilience: how to strengthen your security

Find out how you can improve your business’s cybersecurity and protect against emerging threats with insights and expertise on how to implement cyber resilience into your security strategy.
Why we taught people  how to hack at Civo Navigate

Why we taught people how to hack at Civo Navigate

Hear more about our time at Civo Navigate and why it’s important for everyone to start thinking like an attacker.

Learn from our security experts

Get helpful guidance and tips from our in-house security professionals.

Managed SIEM – What are the benefits?

Managed SIEM – What are the benefits?

Outsourcing SIEM to a third party is often a more balanced option than developing your own solution or purchasing an off-the-shelf product. Here’s how Managed SIEM can alleviate the stress of managing your security operations.
Managed SIEM – An extension of your IT team!

Managed SIEM – An extension of your IT team!

Ever wondered how a SOC team is structured? Our Head of Customer Operations, Daniel explains the difference between Tier 1,2 and 3 analysts.
Managed SIEM – Dealing with your logs

Managed SIEM – Dealing with your logs

From beat agents to API integrations, our Head of Customer Operations, Daniel explains how we collect and manage your log data.
Managed SIEM – is it right for you?

Managed SIEM – is it right for you?

Struggling to pinpoint your security monitoring priorities? Watch as our Head of Customer Operations, Daniel simplifies the process with three crucial questions.
Managed SIEM – Onboarding made easy

Managed SIEM – Onboarding made easy

Daniel, our Head of Customer Operations, explains how we simplify Managed SIEM onboarding. Learn more about the four key stages.
EDR, XDR, SIEM – Explained!

EDR, XDR, SIEM – Explained!

It can be difficult to determine exactly what tools your company requires to improve its cyber security posture. So, Mikey has broken down three key solutions, explaining what the acronyms mean and how they can benefit your business.
PCI DSS v4.0 – 5 Changes you need to know!

PCI DSS v4.0 – 5 Changes you need to know!

In March 2022 the PCI Security Standards Council (PCI SSC) released PCI DSS v4.0, a significant update to the standard that supersedes the existing version - v3.21. Here's Mikey explaining the five key changes you need to know.
3 Top tips from ‘the cybersecurity survival guide’

3 Top tips from ‘the cybersecurity survival guide’

Our SOC manager shares three crucial security best practices that your business should follow to enhance your cybersecurity posture.
Top 5 must have cybersecurity tools!

Top 5 must have cybersecurity tools!

From antivirus to intrusion detection systems, Mikey walks through the top 5 must have cybersecurity tools, all of which help lower cyber insurance premiums.
The FTC Safeguards Rule: 9 essentials steps to protect your business

The FTC Safeguards Rule: 9 essentials steps to protect your business

We have broken down the nine essential steps that US companies should take in order to comply with the FTC Safeguards Rule.

Take control of cyber threats

Identify, prioritise and remediate all your security threats with Defense.com™ XDR

Subscribe

Get actionable cyber security advice and insights straight to your inbox.