Evan Blair, General Manager North America of Searchlight Cyber, explains why dark web intelligence represents a change of strategy when it comes to supply chain attacks - giving organizations unpreced
…
Searchlight Cyber's Director of Threat Intelligence outlines how ransomware groups use the dark web for multiple phases of the "Cyber Kill Chain", giving defenders an opportunity to spot what they're
…
Searchlight Cyber examines the "pre-attack" activity that can be observed on the dark web and how this threat intelligence gives defenders a chance to prevent, rather than just mitigate, cyberattacks.
Searchlight Cyber founders Dr. Gareth Owenson and Ben Jones explain how the dark web works, what criminality it contains, and the challenges it creates for law enforcement and enterprise security team
…
Post-Infection Remediation reduces your risk of ransomware by resetting the application credentials & invalidating session cookies siphoned by infostealer malware. Learn more in this brief video.
Tech talk focusing on core security and governance features of M365, benefits to your organisation, core functionality like Device & App Management, Identity & Access Management, and Threat Protection
An informative virtual session on how to get started with your Cyber Essentials certification, what a threat & vulnerability assessment is, and why this is essential to your business.