Dracoeye tells you what the security experts say about your IP addresses, domains, file hashes and email addresses. Think of it as your security swiss army knife. Find out about the development and where we’re headed with the tool
Why we went with comedy for our viral advert.
Author: Mary-Anne Calora B2B marketing is boring. Bit of a bold statement. But not necessarily a lie, especially in the cyber security industry. Although, who wants to spend a sh*t…
Documentation is great. Read the source
Author: Ross Eastman Author Profile: Ross is an Engineer here at TSC, he doesn’t like labels. He has been a Software Engineer, a SysAdmin, a DevOps Engineer, an SRE, and…
Scafell Pike walk for The Cyber Helpline
Author: Mary-Anne Calora I’m Mary-Anne, Creative Lead for th4ts3cur1ty.company. One of my job roles is to make/create and post content for th4ts3cur1ty and our subsidiary, PocketSIEM. So of course my…
Cyber Security Stockholm Syndrome
If you don’t like reading, and would prefer to ingest this as a conference talk check out this link here After finishing yet another consulting call with a customer who…
Easiest 5 ways IT managers can improve Cyber security for free
IT Managers in SMBs (Small/Medium sized Businesses) often struggle to access cyber security expertise. They can find themselves lumbered with all cyber security responsibilities without the budget to access support.…
THE IMPORTANCE OF A CYBER DEFENCE STRATEGY
What is a cyber defence strategy? let’s take it back to basics and look at what strategy is. A strategy is a plan and route to achieve a set of…
Top 5 ways to build a strong cyber security company culture
Insider threats make up 5% of all cyber attacks, while phishing makes up 37% (Palo Alto Unit42, 2022), and the vast majority are due to insufficient training of employees, rather…
TOOLS OF THE TRADE
Top 7 Reasons to use Security Onion 1. IT’S OPEN SOURCE Security Onion is managed and maintained by Security Onion Solutions. Open Sourcesoftware users have access to its inner workings…
7 INTERNET SAFETY TIPS
th4ts3cur1ty.company 1 Don’t Give Out Personal Information Avoid online phishing attempts by keeping your personal information private. Don’t give out your phone number or banking info to someone you don’t…
10 REASONS TO CHOOSE US OVER OUR BIGGEST SIEM/SOC COMPETITORS
There are so many reasons to choose PocketSIEM for SIEM and SOC here are just 10 of’em! ONCE YOU WORK WITH US YOU NEVER NEED TO BUY SIEM EVER AGAIN!…
Internal SOC VS MSSP
Internal SOC What is it?A central hub for the investigation, triage and remedy of technical security issues, housed within the company itseeks to defend. A team of internal people are…