News & Insights

The increasing risk that IoT devices bring to the cyber security landscape

Written by: Jordan Coogan David Steele is Managing Director and Principal Security Consultant SecuriCentrix. More than budget approval The Internet of Things (IoT) is a physical network of objects or ‘things’ equipped with sensors and software. These help to connect and exchange data with other devices and systems over the internet. Billions of devices all […]

The increasing risk that IoT devices bring to the cyber security landscape Read More »

Cyber Security in Retail - Cyber Security Advisors | SecuriCentrix

How can CISO’s increase their strategic value to a company?

The primary role of a Chief Information and Security Officer (CISO) is to understand the organisation’s cyber threat landscape by identifying and preventing threats. However, their role does not end there. There are numerous things a CISO can do in order to improve the strategic value they provide to the company.  The Importance Of A

How can CISO’s increase their strategic value to a company? Read More »

Virtual Security Officer - Cyber Security Advisors | SecuriCentrix

Understand And Improve Your Incident Response Maturity Level

A proper understanding of the incident response maturity level is important for an organisation’s cybersecurity. Incident Response management is a process that keeps growing continuously. Reaching a maturity level takes time, effort, knowledge transfer, training, and experience. As attackers apply innovative tools to attack, it becomes more important than ever to plan for the ever-evolving

Understand And Improve Your Incident Response Maturity Level Read More »

Managed SIEM - Cyber Security Advisors | SecuriCentrix

What is managed SIEM?

What is SIEM? SIEM refers to Security Information and Event Management. SIEM software aids cybersecurity experts in protecting their IT infrastructure from a variety of cyber attacks. The SIEM system gathers log data from the whole infrastructure of a business, which includes routers, switches, firewalls, servers, personal computers and devices, apps, cloud environments, and other

What is managed SIEM? Read More »

Managed EDR - Cyber Security Advisors | SecuriCentrix

Why Deploy an EDR?

What is an Endpoint? Is your device connected to the internet? Do you use a closed network in your office? Then your device is an endpoint. Any device that is physically at the end of a network can be called an endpoint. They can be laptops, desktops, mobile phones, tablets, servers, and even IoT devices. 

Why Deploy an EDR? Read More »

PCI PIN - Cyber Security Advisors | SecuriCentrix

Payment Security

Introduction While the notion of paying and being paid has remained consistent over time, contemporary payments have significantly reimagined how consumers make payments and how businesses earn, transfer, store, and process consumer payment data. Payment technologies have improved, making payments more unsophisticated and effortless; nonetheless, payment data breaches have evolved, and businesses now have to

Payment Security Read More »

Scroll to Top