Carl Parker

What Is Data Security Posture Management (DSPM)

What is Data Security Posture Management (DSPM)?

Somerford Blog What is Data Security Posture Management (DSPM)? Author: Beth Laws Release Date: 28/06/2024 DSPM is a term being used frequently throughout the Security world. DSPM stands for Data Security Posture Management and focuses on improving businesses’ overall security stance when it comes to their data and compliance requirements. Protecting company data and proprietary

What is Data Security Posture Management (DSPM)? Read More »

What Is Attack Path Analysis

What is Attack Path Analysis?

Somerford Blog What is Attack Path Analysis? Author: Jake Hammacott Release Date: 17/06/2024 Attack path analysis is a generic term used for solutions that attempt to link and visualise risky assets that could be exploited in tandem to progress the state of a cyber-attack. The purpose of this is to enrich compliance, vulnerability and entitlement

What is Attack Path Analysis? Read More »

Splunk .conf24 Summary Showcase: Latest Updates and Key Features from Splunk’s User Conference

Splunk .conf24 Summary Showcase​ Join Somerford’s Senior Security Strategist for a summary of Splunk’s .conf24.​​ WATCH ON DEMAND SIGN UP TO MAILING LIST About the Webinar Join Ben Marrable, Somerford’s Senior Security Strategist (CISSP), for an exclusive webinar summarising the latest developments and key features from Splunk’s latest user conference. We’ll provide an overview of

Splunk .conf24 Summary Showcase: Latest Updates and Key Features from Splunk’s User Conference Read More »

Setting up SplunkWeb with Third Party Certificates End-to-End on a Built Environment (Part 1)

Setting up SplunkWeb with Third Party Certificates End-to-End on a Built Environment (Part 3)

Somerford Blog Setting up SplunkWeb with Third Party Certificates End-to-End on a Built Environment (Part 3) Author: Laurence Everitt Release Date: 29/05/2024 Introduction This is the last part of a 3 part explanation of how to uplift SplunkWeb from presenting a regular HTTP website to using full-blown SSL/TLS HTTPS website, end-to-end. For further information, please

Setting up SplunkWeb with Third Party Certificates End-to-End on a Built Environment (Part 3) Read More »

Setting up SplunkWeb with Third Party Certificates End-to-End on a Built Environment (Part 1)

Setting up SplunkWeb with Third Party Certificates End-to-End on a Built Environment (Part 2)

Somerford Blog Setting up SplunkWeb with Third Party Certificates End-to-End on a Built Environment (Part 2) Author: Laurence Everitt Release Date: 29/05/2024 Introduction This is the second part of a 3 part explanation of how to uplift SplunkWeb from presenting a regular HTTP website to using full-blown SSL/TLS HTTPS website, end-to-end. For further information, please

Setting up SplunkWeb with Third Party Certificates End-to-End on a Built Environment (Part 2) Read More »

Confluent Capabilities Podcast Episode #8

The Dawn of Collaborative Intelligence: Man & Machine in the Industry 5.0 Era: Confluent Podcast Mini Series | S05 – E05, Part 8

Browse Other Episodes From This Series Podcast Man & Machine in the Industry 5.0 EraConfluent Capabilities Podcast Episode #8 Peeling back the layers of generative AI’s current state and projecting its trajectory into the future. WATCH EPISODE >> Episode Summary As we stand on the brink of what is being heralded as Industry 5.0, the

The Dawn of Collaborative Intelligence: Man & Machine in the Industry 5.0 Era: Confluent Podcast Mini Series | S05 – E05, Part 8 Read More »

Scroll to Top