Blog
Read our latest blogs from our expert team.
Mapping the financial services threat landscape
Up to 300 times more vulnerable to cyber threats than organisations in other sectors, financial institutions are a particularly attractive target for cybercriminals. Though a cursory glance at some of history's most massive data breaches shows this has always been the case, the allure of financial firms for cybercriminals is still growing exponentially.
How many cybersecurity vendors does a financial services company need?
According to Cisco, the security landscape is "plagued by too many vendors”. For anyone responsible for cybersecurity within a financial institution, this statement is particularly likely to ring true. While more solutions being available is not necessarily a problem, rather than giving cybersecurity professionals more options for defence, the increasingly crowded solutions marketplace may instead be creating a paradox of choice.
RaaS, the Terrifying Trend Behind the Colonial Pipeline Attack
The biggest cyber attack news story of 2021 may have already happened. Earlier this month, the Colonial Pipeline Company, operator of America's most extensive fuel pipeline system, fell victim to what is undoubtedly a ransomware attack of historic proportions.
Protecting Organisations in the New Reality of Cyber Defence
Experts discuss the threat landscape in 2021 and beyond
Insider Threat: Detecting the enemy within
Whether acting through negligence or malice, insider threats pose a significant risk to organisations of all sizes and across all industries. In this blog and accompanying eBook, Brad Freeman explores the different types of insider threat and offers practical guidance for organisations developing their own insider threat detection and mitigation strategy.
Emerging ransomware attack behaviour
Most information security professionals will be familiar with the devastating effects that ransomware attacks can have on organisations. Within this eBook we will explore the key themes around the evolution of ransomware attacks, including more advanced campaigns that see data exfiltrated before it is encrypted; the rise of ransomware-as-a-service as attackers seek new ways to monetise their cyber operations; and how attackers are using targeted intrusion techniques rather than the scattergun methods of old.
Automating the MITRE ATT&CK Framework
The MITRE ATT&CK framework is quickly becoming the de-facto tool for describing attacker behaviour. This blog demonstrates how Senseon has integrated ATT&CK into the heart of its platform to automatically map real-world events, enabling security teams to better understand their environments at speed and scale.
Iranian Cyber Attack: The Top 5 Techniques
After the US airstrike on Major General Soleimani tensions have escalated. The risk of offensive cyber operations against new Iranian targets beyond their traditional opponents in the Middle East has increased and it is logical to assume there will be a particular focus on western powers. In this blog we will map known Iranian cyber attack techniques to the MITRE ATT&CK Framework.
Senseon Labs: Automated response with Senseon Reflex
Senseon’s Head of Threat Analytics, Brad Freeman, discusses traditional approaches to threat detection and isolation at the network and endpoint layers, and how he hopes Senseon Reflex can shake this up.