Blog
Latest posts
Over the Air Breach
Written by
Peter Bassill
on
February 16, 2024
On the 16th of May, a health care provider engaged Hedgehog Security's SOC365 team to provide a breach investigation following the declaration of a major incident and possible breach by the board.
An Introduction to Managed SIEM
Written by
Peter Bassill
on
February 15, 2024
Organisations face an ever-growing array of threats that demand sophisticated defence mechanisms. Managed Security Information and Event Management (SIEM), a comprehensive solution designed to fortify digital landscapes against cyber threats, is at the for
CVE-2024-21410
Written by
Peter Bassill
on
February 15, 2024
Microsoft acknowledged what we already knew, that a freshly patched newly privilege escalation vulnerability, CVE-2024-21410, was being exploited. The patch was released on the 13th of Febraury and by the evening of the 15th we were seeing exploitation.
AI augmented phishing guidance
Written by
Peter Bassill
on
February 13, 2024
AI-augmented phishing refers to the use of artificial intelligence to enhance and customize phishing attacks, making them more sophisticated and difficult to detect by security measures.
The Challenges of Managing Your Own SIEM or Small SOC
Written by
Peter Bassill
on
October 6, 2023
In the complex and dynamic realm of cybersecurity, managing a Security Information and Event Management (SIEM) or operating a small Security Operations Centre (SOC) presents a unique set of challenges.
The Symphony Of Incident Triage: From Chaos To Clarity
Written by
Peter Bassill
on
October 4, 2023
In the ever-evolving symphony of cybersecurity, the crescendo of chaos can strike unexpectedly. However, within this cacophony lies a harmonious process that transforms chaos into clarity – the process of incident triage.
The Evolution Of Honeypots And Tarpits: A History Of Defending Networks From Attackers
Written by
Peter Bassill
on
October 2, 2023
In the ever-expanding digital landscape, the art of cybersecurity has constantly evolved to counter the threats posed by attackers. Among the ingenious tools devised to safeguard networks, honeypots and tarpits stand out as fascinating innovations.
Streamlining Incident Response With SOC
Written by
Peter Bassill
on
September 25, 2023
In the realm of cybersecurity, chaos and clarity dance an intricate tango. In this ever-evolving landscape, the key to success lies not just in identifying threats, but in swiftly transforming chaos into clarity through effective incident response.
Case Study For A Law Firm Using Our SOC As A Service
Written by
Peter Bassill
on
September 3, 2023
Prior to engaging with Hedgehog Security's SOC service, H&H faced significant gaps in their cybersecurity defenses. The firm relied on traditional firewall and endpoint protection, leaving their network vulnerable to emerging cyber threats.
Find Peace with SOC365
Defend against Cyber Attacks
Report on Cyber Success
By clicking Sign Up you're confirming that you agree with our Terms and Conditions.