
Check out our latest blogs


What is ISO 27001

PCI DSS v4.0 – Five changes you need to know

Discover more about Penetration Testing
The essential guide to Penetration Testing containing everything you need to know, from planning and managing a test, to getting value from the results.
Further reading

The FTC Safeguards Rule: What You Need to Know

The price of protection: Why cyber insurance premiums are on the rise

Cyber resilience: could you withstand a cyber attack?

SIEM Strategy: Building In-House or Outsourcing

The difference between MDR, SOC and managed SIEM

Civo Navigate & Synapse Summit 2023

Security risks in cloud computing

Improve Your Cybersecurity with Password MFA

The Importance of Removing User Access

The Importance of Patch Management

5 Reasons Why You Should Outsource Your SOC

Log Monitoring: A Complete Guide

Everything you need to know about phishing

What is a vCISO? A Complete Guide

Threat Management – June 2022 product update

Post-breach remediation

Top tips on how to defend against ransomware

Key cybersecurity statistics for 2022

Cybersecurity in Public Sector Budgeting

Ukraine crisis: Guidance on strengthening your cybersecurity

Happy Valentine’s Day, love your hacker

Log4j Vulnerability Explained

Cyber Essentials Changes & Updates

Getting started with compliance

Our Saas Platform vs. Microsoft Defender for Business

How to get your team excited about cybersecurity training

Why we built Defense.com™

A guide to cybersecurity for SMBs

4 cybersecurity quick wins for SMB business owners
The nature of SMB business means they typically have increased operational agility compared to their mid-market and enterprise counterparts…

10 things an IT manager should know about cybersecurity
As an IT manager, you’ll know that cybersecurity is a specialist subject with its own skillset, certifications, and technologies…

The importance of involving channel partners in IT security
Through years of helping businesses improve their IT security, we’ve heard many times that small businesses feel particularly underserved…

Understanding ethical hacking
Most businesses would like to avoid being hacked. However, hacking of an ethical nature can actually help improve your security posture…

What SMBs can learn from big breaches
As much as we try to avoid them, cyberattacks are a fact of life. There’s no doubting that the internet brought about heaps of benefits for both our…

The team that got us here
We launched Defense.com™ to help businesses of all sizes overcome security challenges. To allow business leaders to focus on growth and…

Why Cyber Essentials isn’t enough
A Cyber Essentials certification is a significant first step in protecting your business against cyberattacks. By annually renewing your…

What happened when we asked SMBs about cybersecurity
Data from Defense.com’s latest survey reveals serious barriers and misconceptions about cybersecurity among SMBs. We surveyed over…