Blog - SearchInform

Blog

Cyber Attack Detection: What are the Risks of Delay in the Detection and Response and how to Speed up the Attack Discovery Process?

13.10.2023

Read the article to find out how to detect a cyber attack just in time and what are the best practices are for detecting cyber attacks.


Risk assessment Risk management Fraud

A Case in Point: You’ve got Mail

03.10.2023

Recently, it was the birthday of electronic mail. To celebrate the occasion, we would like to share the case study from our practice that involves email.


Risk assessment Investigation DLP

Human Vulnerabilities in Cyber Security

03.07.2023

As technology continues to advance, one persistent problem remains: the vulnerability of humans to cyberattacks.


Risk assessment Risk management Third party

MSSP vs MDR

21.06.2023

MSSP vs MDR: what should you choose? This article will help you understand which one suits to your business needs better.


Risk assessment Risk management Compliance

Which sources should be controlled by the SIEM system first of all?

22.02.2023

It is very useful to maximize the SIEM system load to make sure that you won’t face a situation when something does not work appropriately in the real-life circumstances.


Risk assessment review

SIEM: Use Cases

04.01.2023

We will examine more precisely top SIEM use cases.


review Risk assessment Compliance

Best Network Security Software

18.10.2022

What should you look for when choosing a provider of best network security software?


Risk assessment Risk management

I resolve to… leave those security errors for good in 2021

27.12.2021

The resolutions for businesses to begin the New Year without old mistakes finally cleaning up the awareness mess which never seems to be untangled


Risk assessment Risk management Investigation

Outsourcing the role of information security officer

23.04.2021

A piece of insight into infosec as an MSSP solution


Risk assessment Internal audit Cloud

(In) Secure digest: the science of information security, death cyberattack, and bank leaks

27.10.2020

We collected "classic" and non-trivial incidents reported by foreign media


Risk assessment Devices Risk management

Life changing risks pentesters take to help you boost security

27.07.2020

Conducting a penetration test on a courthouse and defending in front of a judge in the same building a few hours after – this is what happened to two pentesters working under contract.


Risk assessment Third party Investigation

Main aspects of information security

02.10.2019

Corporate security is not a new phenomenon. What we now understand as corporate security has existed since the emergence of trade. Merchants sought to protect their professional secrets from competitors in order not to lose profits.


Risk assessment Confidential documents Internal threat

Risk assessment matrices

05.09.2019

With the plethora of risks that accompany running a business, it is much more practical to have everything organized in written form or, better yet, in the form of diagrams for a concrete, concise representation of which risks the company faces as well as the severity of them.


Risk assessment Fraud Internal threat

Subscribe to get helpful articles and white papers. We discuss industry trends and give advice on how to deal with data leaks and cyberincidents.

هل ترغب بالانتقال الى الصفحة الرئيسية,
او التعرف على المزيد عن الخدمات لمنطقة الشرق
الاوسط و شمال افريقيا؟
Do you want to visit main website
or learn more about MSS for MENA market?