Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Microsoft Threat Protection Specialisation

As you may have seen in the press earlier this year, Stripe OLT recently achieved two crucial Microsoft certifications, in both Modern Work and Security. These certifications (also known as designations) are important to Microsoft solution partners because they signify a deep understanding and proficiency of specific Microsoft technologies.

XDR vs SIEM: Cost-Efficient Cyber Security for Today's Decision Makers

CISOs and IT leaders are tasked with the critical responsibility of safeguarding their organisations against an ever-increasing array of threats, all while striving to optimise costs and drive business growth. CISOs are grappling with the demand to achieve more with limited resources this year—a challenge that many have not encountered before.

Microsoft's Anatomy of a modern attack surface: A breakdown

In today’s hyper-connected digital landscape, cyber security has grown increasingly complex. Organisations are shifting operations to the cloud, enabling remote work, and engaging with third-party ecosystems, expanding the potential attack surfaces. Threat actors are exploiting this complexity with high-volume, multi-faceted attacks.

Benefits of conducting a Penetration Test in your Microsoft Environment

Penetration testing is a pivotal strategy amongst various security methodologies, aimed at bolstering an organisation’s digital environment. Commonly known as “pen testing” or “ethical hacking”, this type of test represents a structured and regulated method for assessing the security integrity of a company’s digital ecosystem.

The Stealthy Threat of AI Prompt Injection Attacks

Just last week the UK’s NCSC issued a warning, stating that it sees alarming potential for so-called prompt injection attacks, driven by the large language models that power AI. The NSCS stated “Amongst the understandable excitement around LLMs, the global tech community still doesn‘t yet fully understand LLM’s capabilities, weaknesses, and (crucially) vulnerabilities.

Windows Server 2012 End of Life

Windows Server 2012, is the sixth version of the Windows Server operating system by Microsoft, as part of the Windows NT family of operating systems. At the time, Windows Server 2012 brought forth an array of enhanced features and refinements, and over the years, it stood as a cornerstone for many organisations, providing a bedrock of reliability, scalability, and adaptability to accommodate applications and workloads.

what is microsoft entra ID?

Microsoft have renamed its cloud-based identity provider from Azure Active Directory to Microsoft Entra ID. Alongside this announcement, Microsoft also introduced Entra Internet Access and Entra Private Access services, which are currently available for public preview. The purpose of this rebranding effort by the tech giant is to streamline the product names and create a cohesive product family.

Best Cyber Firm at The Sparkies

We are very proud to share that we took home ‘Best Cyber Firm’ at this years’ Sparkie’s Awards. The 2023 Sparkies took place during the Bath Digital Festival, organised by Tech Spark, with the awards ceremony taking place in the centre of Bath on 13th July. This annual event celebrates an array of innovative technology companies, based throughout the Southwest.

What is a cloud migration and why do you need one?

In the past, organisations traditionally stored their data, applications, and resources in on-premises servers located in their building and typically managed by an in-house IT team. However, the modern work landscape has changed significantly, many businesses now prefer to migrate their IT infrastructure from on-premises to servers that are hosted and accessed through the internet, also known as ‘The Cloud’.

What is Cyber Resilience?

Having a well-defined approach to managing a wide range of cyber risks is crucial for organisations cyber resilience, regardless of their size. The objective of any cyber resilience strategy is to effectively prepare for, respond to, and swiftly recover from cyber risks, enabling businesses to maintain their operations with minimal disruption to workflow and processes.