Why trust should not automatically mean trusted
Why trust should not automatically mean trusted You run an executable on your system. It starts up drivers and loads…
Insights
Welcome to our blog, powered by our team of cyber security experts. From tech tips and threat breakdowns to industry insights and people-powered stories, our blog delivers practical updates shaped by real-world expertise and everyday innovation.
Why trust should not automatically mean trusted You run an executable on your system. It starts up drivers and loads…
Our view on apprenticeships at SEP2 SEP2 are huge advocates of apprenticeship programmes. Currently, 24% of our workforce are undertaking…
AI-Driven Identity Attacks in 2025 At the beginning of 2025, I was asked to share my thoughts on the main threats we…
Check Point have just released a new update for their Compliance Blade for the following standards: ✅ NIST 800-171 Revision…
The “Bakery Problem” Ask a room of security professionals to define “threat intelligence” in a few words and you’ll most…
There is planned maintenance on Sunday June 8th, 2025 for Harmony Mobile. Plan ahead as the following is true during…
There has been a change to the IP addresses that Check Point sends events for SIEM/SOAR Event Forwarding in the following regions:…
Had my first intro into ThreatLocker and I am liking what I see! ✅Managed windows privilege escalation without giving local admin rights…
Background SEP2 are accredited for information security to the International Standard . SEP2 are cyber security specialists who have a…
On 15th May 2025, we welcomed cyber security professionals from across all sectors to the iconic Science Museum in London for…
At SEP2, we understand that XDR can be a confusing topic, with many solutions claiming to offer unified security. In…
I attended RSA Conference in San Francisco this year alongside over 44,000 other attendees to explore the latest advancements in the cyber…
Get the Latest