Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Redscan

Microsoft threat detection and response: five key pitfalls (and how to address them)

Many will choose the Microsoft ecosystem and will need to become familiar with its native threat detection and response tools and understand how to extract maximum value from them. Kroll’s latest eBook, Microsoft Threat Detection and Response: Five Key Pitfalls (and How to Address Them) provides up-to-date insights to enable businesses to level up their cloud security.

EPP vs EDR - What's The Difference?

With so many different endpoint security options available, it’s essential to understand the features and benefits of each solution before determining which best suits your organisation. The two main forms of advanced endpoint security, as categorised by Gartner, are Endpoint Protection Platforms (EPP) and Endpoint Detection and Response Solutions (EDR). In this blog post, we outline the key differences between the two, how they work and how to get the most out of them.

The Cyber Essentials 2023 update - what's involved?

The National Cyber Security Centre (NCSC) describes this update, version 3.1, as a ‘lighter touch’ update than the previous iteration in 2022, but it still contains some important updates and clarifications. In this blog post, we provide a brief overview of some of the changes. Cyber Essentials is an initiative created with the aim of increasing awareness of cyber security issues and enabling companies to address common types of cyber threats.

Cyber incident response: a guide for small businesses

Cyber incident response offers a structured approach to respond to, manage and mitigate security incidents in order to limit the potential disruption of attacks. In this blog, we discuss how small businesses are being impacted by cyber threats, what cyber incident response involves and the steps you can take to protect your business.