Defense.com™

Defense.com™

Computer and Network Security

Stevenage, Hertfordshire 1,563 followers

The cybersecurity platform that enables organisations to significantly reduce the risk of cyberattacks

About us

Defense.com is transforming the way businesses manage cyber security by allowing them to easily identify, prioritise and remediate threats. We help to simplify and solve the cyber security challenges facing organisations, allowing teams to protect their brand and assets against today’s evolving threat landscape. Businesses of all sizes rely on our solutions to protect, detect and respond to cyber threats.

Website
https://www.defense.com
Industry
Computer and Network Security
Company size
51-200 employees
Headquarters
Stevenage, Hertfordshire
Type
Privately Held
Specialties
Cybersecurity, Vulnerability scanning, Information technology, Data protection, Threat intelligence, Endpoint protection, Cyber training, Log monitoring, Threat monitoring, Managed SIEM, MDR, XDR, EDR, SIEM, cyber protection, Cyber threats, Managed SOC, Security Operations, and Phishing

Locations

Employees at Defense.com™

Updates

  • View organization page for Defense.com™, graphic

    1,563 followers

    Discover how to optimise your cyber security tech stack in the latest Defense in Depth! This month, discover: 💻 The cyber security tools that work best together 🔐 Why you need a defence in depth strategy 📱 How platform consolidation can improve your security posture Ready to learn how to streamline your security? Dive in 👇 #cybersecurity #infosec #technology

    How to optimise your cyber security tech stack

    How to optimise your cyber security tech stack

    Defense.com™ on LinkedIn

  • View organization page for Defense.com™, graphic

    1,563 followers

    𝗖𝗿𝗼𝘄𝗱𝗦𝘁𝗿𝗶𝗸𝗲 𝗶𝗻𝗰𝗶𝗱𝗲𝗻𝘁 𝘀𝗽𝗮𝗿𝗸𝘀 𝗶𝗻𝗰𝗿𝗲𝗮𝘀𝗲 𝗶𝗻 𝗺𝗮𝗹𝗶𝗰𝗶𝗼𝘂𝘀 𝗮𝗰𝘁𝗶𝘃𝗶𝘁𝘆 🚨 With 8.5 million PCs affected, hackers have jumped on the opportunity to cash in. Our SOC Team Lead, Bradleigh, shares the list of fake domains we've found for your sysadmins to block 🚫 Read now 👇 #cybersecurity #phishing #crowdstrike

    CrowdStrike impersonation: Identifying fake domains

    CrowdStrike impersonation: Identifying fake domains

    Defense.com™ on LinkedIn

  • View organization page for Defense.com™, graphic

    1,563 followers

    𝗡𝗲𝘄 𝗖𝘆𝗯𝗲𝗿𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗕𝗶𝗹𝗹 𝗔𝗻𝗻𝗼𝘂𝗻𝗰𝗲𝗱 𝗶𝗻 𝗞𝗶𝗻𝗴'𝘀 𝗦𝗽𝗲𝗲𝗰𝗵 👑 King Charles III has introduced a new Cyber Security and Resilience Bill aimed at strengthening the UK's digital defences. Here's what you need to know: ◼ Expanded regulations covering more digital services ◼ Improved security for public sector supply chains ◼ Increased incident reporting obligations ◼ Greater powers for regulators to enforce security measures. This legislation comes as cyber attacks on critical infrastructure surge. Recent data shows a 100% increase in cyber extortion attacks on healthcare businesses in Q1 2024 compared to Q1 in 2023. The bill aims to tackle crucial areas: 1️⃣ 𝗦𝘂𝗽𝗽𝗹𝘆 𝗰𝗵𝗮𝗶𝗻 𝘃𝘂𝗹𝗻𝗲𝗿𝗮𝗯𝗶𝗹𝗶𝘁𝗶𝗲𝘀:  29% of breaches in Q4 2023 were due to third-party attacks 2️⃣ 𝗣𝘂𝗯𝗹𝗶𝗰 𝘀𝗲𝗰𝘁𝗼𝗿 𝗿𝗶𝘀𝗸𝘀: Focus on securing interconnected systems governed by separate entities 3️⃣ 𝗟𝗲𝗴𝗮𝗰𝘆 𝘀𝘆𝘀𝘁𝗲𝗺𝘀: 30-50% of NHS IT services use outdated technology, increasing breach risks Our CEO Oliver Pinson-Roxburgh shares his thoughts: "𝘔𝘚𝘗𝘴 𝘢𝘯𝘥 𝘤𝘳𝘪𝘵𝘪𝘤𝘢𝘭 𝘴𝘶𝘱𝘱𝘭𝘪𝘦𝘳𝘴 𝘵𝘰 𝘣𝘶𝘴𝘪𝘯𝘦𝘴𝘴𝘦𝘴 𝘸𝘪𝘭𝘭 𝘯𝘦𝘦𝘥 𝘵𝘰 𝘢𝘴𝘴𝘦𝘴𝘴 𝘵𝘩𝘦𝘪𝘳 𝘴𝘦𝘤𝘶𝘳𝘪𝘵𝘺 𝘴𝘵𝘳𝘢𝘵𝘦𝘨𝘪𝘦𝘴 𝘢𝘯𝘥 𝘢𝘭𝘪𝘨𝘯𝘮𝘦𝘯𝘵 𝘸𝘪𝘵𝘩 𝘜𝘒 𝘢𝘯𝘥 𝘌𝘜 𝘕𝘐𝘚 𝘤𝘩𝘢𝘯𝘨𝘦𝘴. 𝘛𝘩𝘦𝘳𝘦 𝘪𝘴 𝘢 𝘳𝘦𝘢𝘭 𝘯𝘦𝘦𝘥 𝘧𝘰𝘳 𝘤𝘺𝘣𝘦𝘳 𝘣𝘶𝘴𝘪𝘯𝘦𝘴𝘴𝘦𝘴 𝘵𝘰 𝘤𝘰𝘭𝘭𝘢𝘣𝘰𝘳𝘢𝘵𝘦 𝘮𝘰𝘳𝘦 𝘸𝘪𝘵𝘩 𝘮𝘪𝘥-𝘮𝘢𝘳𝘬𝘦𝘵 𝘰𝘳𝘨𝘢𝘯𝘪𝘴𝘢𝘵𝘪𝘰𝘯𝘴 𝘴𝘵𝘳𝘶𝘨𝘨𝘭𝘪𝘯𝘨 𝘸𝘪𝘵𝘩 𝘴𝘦𝘤𝘶𝘳𝘪𝘵𝘺 𝘢𝘯𝘥 𝘵𝘰 𝘴𝘶𝘱𝘱𝘰𝘳𝘵 𝘵𝘩𝘦 𝘜𝘒 𝘔𝘚𝘗 𝘮𝘢𝘳𝘬𝘦𝘵 𝘵𝘰 𝘱𝘳𝘰𝘵𝘦𝘤𝘵 𝘵𝘩𝘦𝘪𝘳 𝘤𝘶𝘴𝘵𝘰𝘮𝘦𝘳𝘴, 𝘳𝘦𝘥𝘶𝘤e 𝘤𝘰𝘮𝘱𝘭𝘦𝘹𝘪𝘵𝘺 𝘢𝘯𝘥 𝘢𝘭𝘭𝘰𝘸 𝘣𝘶𝘴𝘪𝘯𝘦𝘴𝘴𝘦𝘴 𝘵𝘰 𝘧𝘰𝘤𝘶𝘴 𝘰𝘯 𝘨𝘳𝘰𝘸𝘵𝘩 𝘢𝘯𝘥 𝘪𝘯𝘯𝘰𝘷𝘢𝘵𝘪𝘰𝘯." What do you think about these new measures?

    King’s Speech: Security in the spotlight as government promises new efforts to lock down insecure IT supply chains

    King’s Speech: Security in the spotlight as government promises new efforts to lock down insecure IT supply chains

    itpro.com

  • View organization page for Defense.com™, graphic

    1,563 followers

    Choosing the right Managed SIEM provider can mean the difference between a reactive and proactive cyber security strategy, affecting your ability to detect, respond to, and mitigate threats effectively. That's why we created our latest buyer's guide to help you make an informed decision that meets your organisation's specific security requirements and long-term goals. Start reading 👉 https://lnkd.in/eUtfD6ed #siem #cybersecurity

  • View organization page for Defense.com™, graphic

    1,563 followers

    Choosing the right Managed SIEM solution can be more challenging than expected. You need a solution that addresses your current needs and scales with your future requirements. Plus, you have to keep your stakeholders satisfied - nobody wants a service that frustrates the team. Given that you don't go through this process regularly, you need to get it right the first time. That's why we've created our 2024 buyer's guide to Managed SIEM. We've pulled together our top tips that will help you during your decision-making process. Learn how to identify your specific needs, evaluate key factors and get a checklist for seamless implementation. Start reading 👉 https://lnkd.in/exxMBHbc #SIEM #cybersecurity

    • No alternative text description for this image
  • View organization page for Defense.com™, graphic

    1,563 followers

    Confused by your cyber security toolbox? Let's simplify it 🛠 SIEM, EDR...what do these acronyms even mean? Dive into our latest blog where we explain just that and help you understand how these tools can improve your cyber security strategy. 𝘐𝘯𝘤𝘭𝘶𝘥𝘦𝘴: 𝘕𝘰 𝘫𝘢𝘳𝘨𝘰𝘯, 𝘫𝘶𝘴𝘵 𝘵𝘩𝘦 𝘧𝘢𝘤𝘵𝘴 𝘺𝘰𝘶 𝘯𝘦𝘦𝘥. Tell me the difference ➡ https://lnkd.in/ewBJgFnz #cybersecurity #infosec #technology

    SIEM vs. EDR: What’s the difference? - Defense.com™

    SIEM vs. EDR: What’s the difference? - Defense.com™

    defense.com

  • View organization page for Defense.com™, graphic

    1,563 followers

    Get your copy of our essential 2024 buyer's guide to Managed SIEM. Dive into detailed information about choosing a solution that not only meets your current needs but also adapts to future growth. Discover expert tips for identifying key features, assessing scalability, and ensuring stakeholder satisfaction. Whether you're starting out or upgrading, this guide offers practical advice for a smooth implementation. Download now 👉 https://lnkd.in/ewhbXkPJ #managedsiem #cybersecurity #technology

Similar pages

Browse jobs