Security information and event management (SIEM) solutions like Microsoft Sentinel SIEM are at the heart of most security operations teams. But like any SIEM, while Microsoft Sentinel can be an incredible tool for centralising security data, it also risks being expensive and ineffective. In a recent webinar I discuss these problems and how SenseOn can…
Read more4 SIEM Augmentation Tools and Why You Need Them
To make your security information and event management (SIEM) platform more efficient, augment it with these 4 cybersecurity tools.
Read moreHow SenseOn Uses Python to Implement Scalable WebSockets Servers With AsyncIO
Here’s how Python allows SenseOn to implement WebSockets in a scalable, effective, and secure way for threat detection and response.
Read moreHow SenseOn supports compliance
This blog was authored by SenseOn’s Director of Technology, Brad Freeman. SenseOn helps organisations improve their security posture and provides the technical capability to meet many of the requirements of common cybersecurity standards. Globally, we have customers who have achieved compliance with ISO 27001, PCI DSS, SOC 2, CIS Top 18, HIPAA, GDPR, and more….
Read moreOneNote malware: A growing threat
This blog was written by Lachlan Godding, SenseOn Security Analyst. SenseOn has analysed various strains of malware using OneNote as the delivery vector. We observed these samples in attack campaigns globally throughout early 2023. This article will discuss the trends observed across these samples, and how SenseOn leveraged our state-of-the-art telemetry to gain insight into…
Read moreBitcoin miners spreading via software cracks
Software privacy comes in many forms, one way is using ‘cracks’ which can be used to bypass the licence and activation software seen in commercial software. Running any software provided by an unknown third party is a really risky thing to do. As it provides an easy method for an attacker to run malicious code…
Read moreNetwork Detection and Response Tools for Remote Working
While remote workforces need network detection and response (NDR) solutions, not all NDRs fit the bill. Here’s why, plus what to look for in a remote-friendly NDR.
Read moreWhy Remote and Hybrid Teams Need NDR
Meta Description: Your team might have gone remote, but network detection and response (NDR) solutions have never been more critical. Here’s why. If you are wondering whether your firm needs network detection and response (NDR), ask yourself this question: How often did your team come into the office in the last week? Probably more than…
Read moreWhy SOCs Need AI Threat Detection
Getting the benefits of AI threat detection tools is becoming less of an option for security operation centres (SOCs). Last year, the UK experienced more cyber attacks than any other country in Europe. According to IBM’s X-Force Threat Intelligence Index report, nearly half (43%) of all cyber attacks in Europe targeted UK-based organisations. The threat…
Read moreA Guide to MITRE ATT&CK Tools
MITRE ATT&CK tools can help security teams to get started with MITRE’s renowned knowledge base. Created in 2013, the MITRE ATT&CK framework, which breaks down attacks in a consistent manner, has grown steadily in popularity. Today, it is an important resource for security teams working in businesses of all sizes and across all types of…
Read more