
Check out our latest blogs


Cyber resilience: could you withstand a cyber attack?

SIEM Strategy: Building In-House or Outsourcing

Discover more about Penetration Testing
The essential guide to Penetration Testing containing everything you need to know, from planning and managing a test, to getting value from the results.
Further reading

The difference between MDR, SOC and managed SIEM

Civo Navigate & Synapse Summit 2023

Security risks in cloud computing

Improve Your Cybersecurity with Password MFA

The Importance of Patch Management

5 Reasons Why You Should Outsource Your SOC

Log Monitoring: A Complete Guide

Everything you need to know about phishing

What is a vCISO? A Complete Guide

Threat Management – June 2022 product update

Post-breach remediation

Top tips on how to defend against ransomware

Key cyber security statistics for 2022

Cyber Security in Public Sector Budgeting

Ukraine crisis: Guidance on strengthening your cyber security

Happy Valentine’s Day, love your hacker

Log4j Vulnerability Explained

Cyber Essentials Changes & Updates

Getting started with compliance

Our Saas Platform vs. Microsoft Defender for Business

How to get your team excited about cyber security training

Why we built Defense.com™

A guide to cyber security for SMEs

4 cyber security quick wins for SME business owners
The nature of SME business means they typically have increased operational agility compared to their mid-market and enterprise counterparts…

10 things an IT manager should know about cyber security
As an IT manager, you’ll know that cyber security is a specialist subject with its own skillset, certifications, and technologies…

The importance of involving channel partners in IT security
Through years of helping businesses improve their IT security, we’ve heard many times that small businesses feel particularly underserved…

Understanding ethical hacking
Most businesses would like to avoid being hacked. However, hacking of an ethical nature can actually help improve your security posture…

What SMEs can learn from big breaches
As much as we try to avoid them, cyber attacks are a fact of life. There’s no doubting that the internet brought about heaps of benefits for both our…

The team that got us here
We launched Defense.com™ to help businesses of all sizes overcome security challenges. To allow business leaders to focus on growth and…

Why Cyber Essentials isn’t enough
A Cyber Essentials certification is a significant first step in protecting your business against cyberattacks. By annually renewing your…

What happened when we asked SMEs about cyber security
Data from Defense.com’s latest survey reveals serious barriers and misconceptions about cybersecurity among SMEs. We surveyed over…