Blog

Read our latest blogs from our expert team.

Brad Freeman Brad Freeman

Mapping the financial services threat landscape

Up to 300 times more vulnerable to cyber threats than organisations in other sectors, financial institutions are a particularly attractive target for cybercriminals. Though a cursory glance at some of history's most massive data breaches shows this has always been the case, the allure of financial firms for cybercriminals is still growing exponentially.

Read More
Brad Freeman Brad Freeman

How many cybersecurity vendors does a financial services company need?

According to Cisco, the security landscape is "plagued by too many vendors”. For anyone responsible for cybersecurity within a financial institution, this statement is particularly likely to ring true. While more solutions being available is not necessarily a problem, rather than giving cybersecurity professionals more options for defence, the increasingly crowded solutions marketplace may instead be creating a paradox of choice.

Read More
Brad Freeman Brad Freeman

RaaS, the Terrifying Trend Behind the Colonial Pipeline Attack

The biggest cyber attack news story of 2021 may have already happened. Earlier this month, the Colonial Pipeline Company, operator of America's most extensive fuel pipeline system, fell victim to what is undoubtedly a ransomware attack of historic proportions.



Read More
Brad Freeman Brad Freeman

Insider Threat: Detecting the enemy within

Whether acting through negligence or malice, insider threats pose a significant risk to organisations of all sizes and across all industries. In this blog and accompanying eBook, Brad Freeman explores the different types of insider threat and offers practical guidance for organisations developing their own insider threat detection and mitigation strategy.

Read More
Brad Freeman Brad Freeman

Emerging ransomware attack behaviour

Most information security professionals will be familiar with the devastating effects that ransomware attacks can have on organisations. Within this eBook we will explore the key themes around the evolution of ransomware attacks, including more advanced campaigns that see data exfiltrated before it is encrypted; the rise of ransomware-as-a-service as attackers seek new ways to monetise their cyber operations; and how attackers are using targeted intrusion techniques rather than the scattergun methods of old.

Read More
Brad Freeman Brad Freeman

Automating the MITRE ATT&CK Framework

The MITRE ATT&CK framework is quickly becoming the de-facto tool for describing attacker behaviour. This blog demonstrates how Senseon has integrated ATT&CK into the heart of its platform to automatically map real-world events, enabling security teams to better understand their environments at speed and scale.

Read More
Brad Freeman Brad Freeman

Iranian Cyber Attack: The Top 5 Techniques

After the US airstrike on Major General Soleimani tensions have escalated. The risk of offensive cyber operations against new Iranian targets beyond their traditional opponents in the Middle East has increased and it is logical to assume there will be a particular focus on western powers. In this blog we will map known Iranian cyber attack techniques to the MITRE ATT&CK Framework.

Read More