Resource Hub

From e-books and blogs to exciting podcasts and software case studies, Blacklight’s resource hub is a collection of curated content designed to help you stay ahead in the cybersecurity space.

Featured

E-book | Why The Future Of Cybersecurity Is Proactive

A Guide to Next-Gen SIEM: Why the future of cybersecurity is proactive. In today's ever-evolving digital landscape, businesses encounter a myriad of cybersecurity challenges. The relentless evolution of cyber threats demands robust security solutions capable of not only addressing but foreseeing and preventing potential risks, essential for sustaining business growth.This e-book caters to cybersecurity consultants, brand managers, and pivotal decision-makers, offering...

Cyber Insights

Organisations need to adopt five steps to detect threats effectively and proactively opt

Organisations need to adopt five steps to detect threats effectively and proactively

Co-Authors: Ralph Chammah, CEO of OwlGaze Miro Pihkanen, CSO of OwlGaze Most organisations rely on perimeter security measures to protect their networks from cyberattacks. However, this is no longer sufficient. Recently, high-profile attacks have illustrated how sophisticated attackers have become and how they are finding ways to penetrate even the best-defended networks. To stay ahead of attackers, […]

Identity Access Management IAM helps prevent cryptocurrency cybercrime which is at an all time high opt

Identity & Access Management (IAM) helps prevent cryptocurrency cybercrime, which is at an all-time high

According to Comparitech’s cryptocurrency heists tracker, hackers have stolen £7.1 billion in cryptocurrency since 2011, which is about £40.6 billion today Recent research by Rekt reports that cybercriminals have stolen £2.6 billion through 141 different cryptocurrency exploits since January this year, putting 2022 on track to surpass 2021 in terms of digital currency malfeasance.

6

Inside SIEM: Exploring SIEM’s Architecture and Components

In a time of rampant data breaches and cyber-attacks, companies must continually re-assess their cybersecurity game plan. Security Information and Event Management (SIEM) is a cybersecurity solution widely praised for its benefits – yet it is seen as complex, which is understandable given its many components. Nonetheless, gaining a comprehensive understanding of SIEM can help […]

Improving Your Security Posture with MITRE ATTCK opt

Improving Your Security Posture with MITRE ATT&CK

Like a well-fortified castle designed to withstand any invasion, an effective cybersecurity strategy shields your business from attack. This article explores the role of MITRE ATT&CK, an expansive knowledge base and model for cyber adversary behaviour, in enhancing an organisation’s security posture. First, we will provide a comprehensive overview of MITRE ATT&CK, followed by a […]

BlacklightFeaturedImage howtochoosetherightsiem squashed

How to Choose the Right SIEM for Your Organisation

Cyber-attacks today are not only increasing in volume but are becoming more sophisticated, with many adversaries now relying on AI and other advanced software to launch attacks. The good news is that investing in a high-quality SIEM can prevent and mitigate most of these threats. Cloud-based SIEMs that utilise artificial intelligence (AI) and machine learning […]

What is SIEM and what can it do for your business

What is SIEM and what can it do for your business?  

As more businesses digitise and cyberattacks become increasingly complex, organisations of all kinds are realising the importance of establishing a robust cybersecurity strategy. Enter Security Information and Event Management (SIEM). Fortunately, SIEM is a security solution that can help businesses reliably mitigate risk and safeguard sensitive data. SIEM combines security information management (SIM) and security […]