document.body.classList.toggle('menu-open', show); // Add 'menu-open' class to body.

Cybersecurity Blog:
Get Cyber Security Insights from Our Experienced Team

Learn everything you need to know about cybersecurity with insightful guides and articles written by our team.

th4ts3cur1ty.company - Meet The Team - Eliza
Looking for Internet Safety Tips eh? People of all ages come with a range of skills and understanding when it comes to surfing the web. The following list is to help you keep yourself protected while online.
July 11, 2022
th4ts3cur1ty.company - Meet The Team - Eliza
There are so many reasons to choose PocketSIEM for SIEM and SOC over our Biggest BIGGEST SIEM/SOC competitors … here are just 10 of’em! Biggest SIEM/SOC competitors? With Us You Never Need To Buy SIEM Ever Again!
July 11, 2022
th4ts3cur1ty.company - Meet The Team - Eliza
Decisions, Decisions – Internal SOC vs MSSP. Navigating the managed IT security landscape can be daunting for businesses, particularly when looking into internal SOC VS MSSP.
July 11, 2022
th4ts3cur1ty.company - Meet The Team - Eliza
Why use Wazuh Agent for Endpoint Security? Your search led you here and likely with the question, “Why use Wazuh Agent for Endpoint Security?”. Strap yourself in, we have opinions.
July 11, 2022
th4ts3cur1ty.company - Meet The Team - Eliza
It’s the wild west out there. The tactics of SIEM providers can it times be underhand and in other complete bullsh*t. This article breaks down what may be happening to you and just as a kicker … how we can help.
July 11, 2022
th4ts3cur1ty.company - Meet The Team - Eliza
Choosing a Managed Security Service Provider (MSSP) is a crucial decision, and knowing the right questions to ask an MSSP is essential. Our guide, “Top 6 Questions to Ask an MSSP Before You Buy,” will help you navigate this process.
July 11, 2022
th4ts3cur1ty.company - Meet The Team - Eliza
What Misconceptions Of SIEM might you have? Addressing the misconceptions of SIEM (Security Information and Event Management) is crucial for businesses looking to strengthen their cybersecurity strategies.
July 11, 2022
th4ts3cur1ty.company - Meet The Team - Eliza
Understanding that HSSP is a hybrid approach to cyber defence is essential for modern businesses. We explore how this innovative strategy combines the strengths of various security measures to provide comprehensive protection.
July 10, 2022
th4ts3cur1ty.company - Meet The Team - Eliza
Cyber security in mergers and acquisitions is a critical aspect that businesses cannot afford to overlook. We now delve into the importance of integrating robust cybersecurity measures during these complex transactions.
January 12, 2022
th4ts3cur1ty.company - Meet The Team - Eliza
Supply chain attacks were up 78% in 2019. (Symantec) and are now thought to make up 65% of cyber-attacks! This will change over time and so will the attacks, the vectors, the preventions and the reactions.
January 12, 2022
th4ts3cur1ty.company - Meet The Team - Eliza
Our industry is filled with cyber buzzwords, acronyms and hype; but which should IT leaders actually be paying attention to? Cyber Buzzwords – in No Particular Order.
October 25, 2021
th4ts3cur1ty.company - Meet The Team - Eliza
Want to attract more women to cyber security? It’s crucial for fostering diversity and innovation within the industry. This guide offers practical strategies for creating a more inclusive and supportive environment.
August 26, 2021
th4ts3cur1ty.company - Meet The Team - Eliza
Budget optimisation through purple teaming is an effective strategy for maximising cybersecurity resources and improving defence mechanisms. This guide explores how integrating the strengths of both red and blue teams can lead to more efficient use of your budget while enhancing security measures.
December 6, 2020
th4ts3cur1ty.company - Meet The Team - Eliza
Purple Team like you’re preparing for war to ensure your cybersecurity defences are battle-ready. This guide delves into the rigorous approach of purple teaming, combining the offensive tactics of red teams with the defensive strategies of blue teams.
December 5, 2020
th4ts3cur1ty.company - Meet The Team - Eliza
Run a PurpleTeam operation for FREE to enhance your cybersecurity defences without incurring additional costs. This guide provides step-by-step instructions on leveraging available resources to conduct effective purple teaming exercises.
December 4, 2020
th4ts3cur1ty.company - Anonymous Testimonial Man
Using MITRE ATT&CK Navigator for intelligence gathering is a powerful method to enhance your cybersecurity strategy. Leverage the comprehensive framework of the MITRE ATT&CK Navigator to map out adversarial tactics, techniques, and procedures.
December 4, 2020