Carl Parker

What Does Splunk Attack Analyzer Do

What Does Splunk Attack Analyzer Do?

Somerford Blog What Does Splunk Attack Analyzer Do? Author: Jake Hammacott Release Date: 24/02/2025 In the contemporary digital landscape, malicious actors and adversaries are continuously evolving their tactics, techniques, and procedures (TTPs). They relentlessly innovate and devise increasingly sophisticated attacks aimed at circumventing the security measures implemented by legitimate organisations. These attacks can take various

What Does Splunk Attack Analyzer Do? Read More »

Why Organisations Need Privileged Access Management Systems

Why Organisations Need Privileged Access Management Systems

Somerford Blog Why Organisations Need Privileged Access Management (PAM) Systems Author: Ewan Brown Release Date: 03/02/2025 In the modern digital landscape, securing an organisation’s sensitive data and infrastructure is critical. Cyber threats are constantly evolving, and one of the primary targets for attackers is privileged accounts. These accounts hold elevated permissions, allowing users to access

Why Organisations Need Privileged Access Management Systems Read More »

Varonis and Sensitive Data – Classification, Lifecycle Management and AI Generated Data

COMPLIMENTARY GIFT – Attend our Series and Complete a Post-Event Feedback Form to Receive ‘Rachael’s Kitchen’ Cupcakes (UK Attendees Only)! Webinar Series Varonis and Sensitive Data – Classification, Preparing for AI and SaaS Data Discover, classify, and manage the lifecycle your sensitive data to reduce risk and ensure compliance. Attend and Claim Rachael’s Kitchen Cupcake

Varonis and Sensitive Data – Classification, Lifecycle Management and AI Generated Data Read More »

What is SASE

What is SASE? A Guide to Secure Access Service Edge

Somerford Blog What is SASE? A Guide to Secure Access Service Edge Author: Saul Mulcrow Release Date: 29/01/2025 With businesses shifting towards remote and hybrid environments, alongside the digital transformation of organisations, there has been a need for more secure and flexible network architectures. This is where we can utilise Secure Access Service Edge (or

What is SASE? A Guide to Secure Access Service Edge Read More »

How HashiCorp's Solutions Suite Secures Kubernetes for Business Success

How HashiCorp’s Solutions Suite Secures Kubernetes for Business Success

Somerford Blog How HashiCorp’s Solutions Suite Secures Kubernetes for Business Success Author: John Jarvis Release Date: 22/01/2024 Kubernetes has become a cornerstone of modern architecture. But managing it at scale, and securely, can be a big challenge. That’s where HashiCorp’s suite of tools comes in. From secrets management with Vault to service mesh security with

How HashiCorp’s Solutions Suite Secures Kubernetes for Business Success Read More »

How Does Varonis MDDR Help to Mitigate Complex Threats

How Does Varonis MDDR Help to Mitigate Complex Threats?

Somerford Blog How Does Varonis MDDR Help to Mitigate Complex Threats Author: Beth Laws Release Date: 23/12/2024 The new Varonis Managed Data Detection and Response (MDDR) offering provides 24/7, 365 days a year service. MDDR combines the data security platform’s award winning threat detection technology alongside the Varonis team of cyber experts to investigate and

How Does Varonis MDDR Help to Mitigate Complex Threats? Read More »

Confluent: Event-Driven Architecture (EDA) 101​ Webinar

Introductory Webinar Confluent: Event-Driven Architecture (EDA) 101​ How Event-Driven Architecture (EDA) can transform real-time data processing and integration. Available to Watch on Demand Virtual, GoToWebinar Please complete a GoToWebinar System Check to ensure device compatibility SIGN UP TO MAILING LIST WATCH NOW Introduction to Event-Driven Architecture (EDA)​ Join Jamie Turbill, Certified Confluent Technical Expert, for

Confluent: Event-Driven Architecture (EDA) 101​ Webinar Read More »

Scroll to Top