Understanding threat sources

Understanding threat sources

This whitepaper from Proact offers best practices for using SIEM to identify, track & respond to malicious actors in your network. Optimise SIEM for robust cyber security Companies are getting serious about data. Across all aspects of business operations, the need...
High alert: Staying vigilant to unexpected threats & incidents

Offensive vs Defensive security

Conventionally, most security strategies have relied heavily on defensive approaches to limit the scope for attack. Now, many organisations are finding success by adding ‘offensive’ measures to their strategy in order to test the robustness of their IT...
Rise of the security superhero

Rise of the security superhero

A new era of IT calls for a new kind of hero. As the impact of cyber crime becomes more widely understood across the business, the IT manager has a greater responsibility to make sure security remains high on the agenda. Join us as we follow our hero’s journey...