Blog

Read our latest blogs from our expert team.

David Atkinson David Atkinson

It’s not just Santa who’s coming to town…

Christmas is fast approaching, which, for many people, means a week or two of well-deserved time off. Unfortunately, for cybersecurity professionals within lean security teams, downing tools this Christmas may not be an option.

Read More
David Atkinson David Atkinson

Announcing SenseOn's Series A and the security architecture of the future

Today finds me incredibly humbled to announce SenseOn’s $20 million Series A funding round, led by Eight Road Ventures (ERVE) and supported by our existing investors MMC Ventures, Crane Venture Partners and Winton Ventures Limited. The funds we have secured will be used to achieve our mission of delivering the security architecture for the future, to protect and empower organisations, reduce stress for leaders, costs for businesses; and drive forward operational efficiencies for security teams.

Read More
Brad Freeman Brad Freeman

Mapping the financial services threat landscape

Up to 300 times more vulnerable to cyber threats than organisations in other sectors, financial institutions are a particularly attractive target for cybercriminals. Though a cursory glance at some of history's most massive data breaches shows this has always been the case, the allure of financial firms for cybercriminals is still growing exponentially.

Read More
Brad Freeman Brad Freeman

How many cybersecurity vendors does a financial services company need?

According to Cisco, the security landscape is "plagued by too many vendors”. For anyone responsible for cybersecurity within a financial institution, this statement is particularly likely to ring true. While more solutions being available is not necessarily a problem, rather than giving cybersecurity professionals more options for defence, the increasingly crowded solutions marketplace may instead be creating a paradox of choice.

Read More
David Atkinson David Atkinson

SenseOn recognised as a WEF Technology Pioneer 2021

It is a great privilege to be able to share with you all, some of what has been happening within the company recently, as well as a humbling announcement that makes me incredibly proud of our customers, our partners, our investors and our team that have made it possible.


Read More
Brad Freeman Brad Freeman

RaaS, the Terrifying Trend Behind the Colonial Pipeline Attack

The biggest cyber attack news story of 2021 may have already happened. Earlier this month, the Colonial Pipeline Company, operator of America's most extensive fuel pipeline system, fell victim to what is undoubtedly a ransomware attack of historic proportions.



Read More
David Atkinson David Atkinson

The Hidden Cost of Alert Fatigue

As they become desensitised to a barrage of potential attacks, fatigued security teams are more likely to miss the subtle signs of an intruder within their system.


Read More
David Atkinson David Atkinson

SIEMingly ineffective?

As a follow-up to our eBook, ‘The Future of SIEMs: do they have one?’, in this blog we expand on some work that Senseon has been doing with customers around optimising their existing SIEM deployment.

Read More
David Atkinson David Atkinson

What does a data breach cost in 2020?

The answer, according to the Ponemon Institute’s ‘Cost of a Data Breach Report 2020’ is $3.86 million.

Now in its 15th year, the 2020 report, commissioned by IBM, surveyed 3,200 people from 524 organisations in 17 industries across 17 countries and regions and revealed that the average total cost of a data breach has actually declined by 1.5% as compared to the 2019 report which found the average cost to be $3.92 million.

Read More
Guest User Guest User

Securing the future

We are excited to be partnering with the likes of BT, Cisco and other members of the i-Trace consortium and we are looking forward to what the future may hold for our collaboration. In this blog, I want to take some time to share with you a little of Senseon’s story: what we do, what we hope to achieve and what we are contributing to the i-Trace project.

Read More
Brad Freeman Brad Freeman

Insider Threat: Detecting the enemy within

Whether acting through negligence or malice, insider threats pose a significant risk to organisations of all sizes and across all industries. In this blog and accompanying eBook, Brad Freeman explores the different types of insider threat and offers practical guidance for organisations developing their own insider threat detection and mitigation strategy.

Read More
Karl McCarthy Karl McCarthy

The vSOC every CISO needs

The cyber security market has never been so crowded and it can seem like a thankless task to have to wade through the noise and marketing fluff to find a solution that you at least think is going to go some way to achieving your ambitions. In this blog, I will share my journey as a CISO in navigating the market, the challenges of deploying technology during the COVID-19 pandemic, and the transformation and security efficiencies that the Senseon team and technology have provided us.

Read More
Brad Freeman Brad Freeman

Emerging ransomware attack behaviour

Most information security professionals will be familiar with the devastating effects that ransomware attacks can have on organisations. Within this eBook we will explore the key themes around the evolution of ransomware attacks, including more advanced campaigns that see data exfiltrated before it is encrypted; the rise of ransomware-as-a-service as attackers seek new ways to monetise their cyber operations; and how attackers are using targeted intrusion techniques rather than the scattergun methods of old.

Read More
David Atkinson David Atkinson

Cyber security process automation.

The information security community is turning to process automation to solve a number of use cases and challenges. This blog draws on some of the conversations we have been having with security leaders, which are also discussed in more detail in our eBook on Cyber security process automation.

Read More
Brad Freeman Brad Freeman

Automating the MITRE ATT&CK Framework

The MITRE ATT&CK framework is quickly becoming the de-facto tool for describing attacker behaviour. This blog demonstrates how Senseon has integrated ATT&CK into the heart of its platform to automatically map real-world events, enabling security teams to better understand their environments at speed and scale.

Read More
Aaron Gerow Aaron Gerow

Cyber threats evading signatures: Outlier, anomaly or both?

The idea of an outlier is a statistical concept, and like any good concept, it’s helpful. In many areas of statistics, outliers are defined as data points that make it difficult for models to accurately characterise effects and predict outcomes. Given enough data, this difficulty can be measured exactly by scoring data points based on precisely how much they reduce a model’s predictive accuracy on new data.

Read More