What's the difference between SIEM and Compromise Assessment?
There are very few documents available on the web regarding this topic so I thought we should put something together that might help people...
There are very few documents available on the web regarding this topic so I thought we should put something together that might help people...
Prevention is an essential component of any comprehensive cybersecurity program. Unfortunately, even the best defences aren’t 100%...
Mergers and acquisitions (M&As) can massively expand a business’s reach and income, but they could also put it in a precarious position if...
Let's say you have a highly organised pot with marbles in two colours. Imagine that you want to extract a specific-coloured marble from...
Unless you are the CEO of a cybersecurity company, chances are you are not a cybersecurity expert and so rely on the advice of your IT Team.
Protecting companies from cybersecurity breaches is a task that never stops—and one that requires constant vigilance on behalf of clients....
Red Teaming has long been using a framework to automate the chronological stages of researching and testing for vulnerabilities.
In a time...
Regarding this latest series of ransomware attacks against the Irish Health Service Executive (HSE). We asked the guys in the GuardYoo...
Distinguishing between information technology and cybersecurity can be challenging since both fields utilize computers and information...
Companies worldwide have been facing an acute shortage of qualified cybersecurity professionals for many years. That fact is underlined by...
Let's begin with an old maxim: "You must inspect what you expect."
What does this mean? And why am I quoting it?
This old saying tells us...
In cybersecurity, as in healthcare, prevention is always a better option than a cure. While the team here at GuardYoo specializes in...
Over the past few months, we have had an opportunity to speak with many people from many different industries about cybersecurity...
The cyber landscape is always evolving - and it’s doing so at a rapid pace. With organisations forced to implement remote working, it’s...
“Fileless Malware Attacks” & “Non-Malware Attacks” are terms that are being used more and more recently to describe some of the latest...