Resource Hub

From e-books and blogs to exciting podcasts and software case studies, Blacklight’s resource hub is a collection of curated content designed to help you stay ahead in the cybersecurity space.

Featured

Cybersecurity for Critical Infrastructure Industries

Critical sectors and operators across the energy, water, telecommunications, and transportation sectors provide fundamental services that form the backbone of society and keep it running. Yet, this centrality also makes them prime targets for cybercriminals seeking to cause large-scale disruption or obtain control over vital assets.With mixed IT and OT environments, the rise of the Internet of Things (IoT), and recent...

Cyber Insights

Identity Access Management IAM helps prevent cryptocurrency cybercrime which is at an all time high opt

Identity & Access Management (IAM) helps prevent cryptocurrency cybercrime, which is at an all-time high

According to Comparitech’s cryptocurrency heists tracker, hackers have stolen £7.1 billion in cryptocurrency since 2011, which is about £40.6 billion today   Recent research by Rekt reports that cybercriminals have stolen £2.6 billion through 141 different cryptocurrency exploits since January this year, putting 2022 on track to surpass 2021 in terms of digital currency malfeasance.   Although cryptocurrency […]

6

Inside SIEM: Exploring SIEM’s Architecture and Components

In a time of rampant data breaches and cyber-attacks, companies must continually re-assess their cybersecurity game plan. Security Information and Event Management (SIEM) is a cybersecurity solution widely praised for its benefits – yet it is seen as complex, which is understandable given its many components. Nonetheless, gaining a comprehensive understanding of SIEM can help […]

Improving Your Security Posture with MITRE ATTCK opt

Improving Your Security Posture with MITRE ATT&CK

Like a well-fortified castle designed to withstand any invasion, an effective cybersecurity strategy shields your business from attack. This article explores the role of MITRE ATT&CK, an expansive knowledge base and model for cyber adversary behaviour, in enhancing an organisation’s security posture.   First, we will provide a comprehensive overview of MITRE ATT&CK, followed by […]

Safeguarding Critical Utilities– The Importance Of A Risk Based Cybersecurity Approach 4 1

Support Test

Et autem molestiae aut culpa nobis quo necessitatibus laborum. Lorem ipsum dolor sit amet. Id repellendus inventore Non corporis quo reprehenderit ipsum sed numquam earum aut corporis sint non eaque dolor nam odit nulla. Eos illo nullaEt eligendi et nobis exercitationem. Qui error esse qui nihil quod. Est perferendis dicta et consequuntur repudiandaeAut galisum qui […]

BlacklightFeaturedImage howtochoosetherightsiem squashed

How to Choose the Right SIEM for Your Organisation

Cyber-attacks today are not only increasing in volume but are becoming more sophisticated, with many adversaries now relying on AI and other advanced software to launch attacks. The good news is that investing in a high-quality SIEM can prevent and mitigate most of these threats. Cloud-based SIEMs that utilise artificial intelligence (AI) and machine learning […]

What is SIEM and what can it do for your business

What is SIEM and what can it do for your business?  

As more businesses digitise and cyberattacks become increasingly complex, organisations of all kinds are realising the importance of establishing a robust cybersecurity strategy.   Enter Security Information and Event Management (SIEM). Fortunately, SIEM is a security solution that can help businesses reliably mitigate risk and safeguard sensitive data.   SIEM combines security information management (SIM) […]