Getting ISO27001 Certified – What’s Involved?

As the pre-eminent global information security management system standard, ISO27001 offers countless business benefits to businesses willing to engage with the standard, and even more to those willing to undertake accreditation. So what does that involve? To help you understand what’s involved, this article aims to give a concise overview of the process and outlines […]
ISO27001 – What Is It, and How Could It Benefit Your Business?

Jointly published in 2005 by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), ISO27001 is an internationally recognised standard for establishing and maintaining a robust information security management system. Having undergone several revisions since its inception, ISO27001 is the leading global information security management standard, with certification to the standard considered […]
What are the Top 7 Benefits of Penetration Testing?

In business, risk-benefit analyses act as the basis for many decisions. Whether it’s adopting a new way of working, bringing a new product to market or investing in a new piece of machinery, any major decision carries a degree of risk, and it’s important to be able to quantify and manage these risks. Penetration testing […]
What is Penetration Testing?

The simplest definition of a penetration test is: an exercise that aims to determine the efficacy of an IT system’s security measures by simulating a breach by an adversary. Penetration tests come in various forms, each designed to replicate an attack technique employed by cybercriminals. Tests can be used to stress-test individual systems or combined […]
What is Penetration Testing and Why do I need it?

Hacking through a company’s security protections used to require a lot of time and skill. However, today’s technological advances make it easier than ever for bad actors to find an organisation’s most vulnerable points…
Vulnerability Scanning vs Penetration Tests

We always hear in the news about organisation’s around the globe are vulnerable to cyber-attacks. So, there is no better time to get yourself clued up about vulnerability scanning and penetration testing than now
Meet Log Analyser

Have you seen the online SIEM calculators used by some vendors? These calculators appear to give a view of log collection that indicates great visibility utilising little storage, however did you read the terms and conditions…
DEFENCELOG – YOUR NEXT GENERATION SIEM

Our new YouTube channel is live. We will be posting content to show case innovative security technologies or our favourite hacking demonstrations.
RETURN ON INVESTMENT OF A SIEM

They say if you can’t measure it, don’t do it. I like to quantify investments, money spent and what is my investment’s return? A SIEM…
SIEM Design – Filtering Windows Events

A SIEM solution accepts logs from a wide variety of log sources including network security appliances, Linux systems and often windows domain joined systems to name a few. SIEM solutions are designed to analyse these logs and look for patterns and or suspicious behaviour that may indicate a security incident that could impact your business. […]