Insights

Blog

Welcome to our blog, powered by our team of cyber security experts. From tech tips and threat breakdowns to industry insights and people-powered stories, our blog delivers practical updates shaped by real-world expertise and everyday innovation.

Image for Blog
Blog Post Image

Why trust should not automatically mean trusted

Why trust should not automatically mean trusted You run an executable on your system. It starts up drivers and loads…

Read More
Blog Post Image

Our view on apprenticeships at SEP2

Our view on apprenticeships at SEP2 SEP2 are huge advocates of apprenticeship programmes. Currently, 24% of our workforce are undertaking…

Read More
Blog Post Image

What is ‘Identity’ in Cyber Security? It’s Not Who You Say You Are

AI-Driven Identity Attacks in 2025 At the beginning of 2025, I was asked to share my thoughts on the main threats we…

Read More
Tech Tips Post Image

Tech Tip: New Check Point Compliance Blade Standards Released

Check Point have just released a new update for their Compliance Blade for the following standards: ✅ NIST 800-171 Revision…

Read More
Blog Post Image

A Smarter Approach to Threat Intelligence: Solving the “Bakery Problem”

The “Bakery Problem” Ask a room of security professionals to define “threat intelligence” in a few words and you’ll most…

Read More
Tech Tips Post Image

Tech Tip: Check Point Harmony Mobile Maintenance Advanced Notification

There is planned maintenance on Sunday June 8th, 2025 for Harmony Mobile. Plan ahead as the following is true during…

Read More
Tech Tips Post Image

Tech Tip: Check Point Updated SIEM/SOAR Event Forwarding IP Address

There has been a change to the IP addresses that Check Point sends events for SIEM/SOAR Event Forwarding in the following regions:…

Read More
Tech Tips Post Image

Tech Tip: Interesting New Look at Threatlocker

Had my first intro into ThreatLocker and I am liking what I see! ✅Managed windows privilege escalation without giving local admin rights…

Read More
Blog Post Image

SEP2 achieve the International Standard for Information Security

Background SEP2 are accredited for information security to the International Standard . SEP2 are cyber security specialists who have a…

Read More
Blog Post Image

SEP2 Cyber Summit 2025

On 15th May 2025, we welcomed cyber security professionals from across all sectors to the iconic Science Museum in London for…

Read More
Blog Post Image

XDR in Practice: Achieving Unified Visibility and Response Across Your Organisation

At SEP2, we understand that XDR can be a confusing topic, with many solutions claiming to offer unified security. In…

Read More
Blog Post Image

RSA Conference 2025 Takeaways

I attended RSA Conference in San Francisco this year alongside over 44,000 other attendees to explore the latest advancements in the cyber…

Read More

Get the Latest

Wingman Insights

Photo of Paul Starr

Stay in the know with the latest in cyber security, subscribe to our newsletter to get monthly insights from SEP2’s industry experts delivered straight to your inbox

Name(Required)